Vulnerability Details : CVE-2012-0787
The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.
Exploit prediction scoring system (EPSS) score for CVE-2012-0787
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-0787
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.7
|
LOW | AV:L/AC:H/Au:N/C:P/I:P/A:P |
1.9
|
6.4
|
NIST |
References for CVE-2012-0787
-
http://rhn.redhat.com/errata/RHSA-2013-1537.html
RHSA-2013:1537 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://augeas.net/news.html
Augeas — Releases
-
https://bugzilla.redhat.com/show_bug.cgi?id=772261
772261 – (CVE-2012-0787) CVE-2012-0787 augeas: susceptible to mountpoint attackExploit
-
https://github.com/hercules-team/augeas/commit/b8de6a8c
Prevent cross-mountpoint attacks via .augsave during saving · hercules-team/augeas@b8de6a8 · GitHubExploit;Patch
Products affected by CVE-2012-0787
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:*:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:augeas:augeas:0.7.1:*:*:*:*:*:*:*