CVE-2003-0547

Current Description

GDM before 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.

Basic Data

PublishedAugust 27, 2003
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm2.4.1*******
    2.3ApplicationGnomeGdm2.4.1.1*******
    2.3ApplicationGnomeGdm2.4.1.2*******
    2.3ApplicationGnomeGdm2.4.1.3*******
    2.3ApplicationGnomeGdm2.4.1.4*******
    2.3ApplicationGnomeGdm2.4.1.5*******
    2.3ApplicationGnomeGdm2.4.1.6*******
    2.3ApplicationRedhatKdebase2.4.0.7.13*i386*****
    2.3ApplicationRedhatKdebase2.4.1.3.5*i386*****

Vulnerable Software List

VendorProductVersions
Gnome Gdm 2.4.1, 2.4.1.1, 2.4.1.2, 2.4.1.3, 2.4.1.4, 2.4.1.5, 2.4.1.6
Redhat Kdebase 2.4.0.7.13, 2.4.1.3.5

References

NameSourceURLTags
CLA-2003:729http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729CONECTIVA
http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.htmlhttp://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.htmlCONFIRM
20030824 [slackware-security] GDM security update (SSA:2003-236-01)http://marc.info/?l=bugtraq&m=106194792924122&w=2BUGTRAQ
RHSA-2003:258http://www.redhat.com/support/errata/RHSA-2003-258.htmlREDHATPATCH Vendor Advisory
oval:org.mitre.oval:def:112https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A112OVAL