CVE-2006-1057

Current Description

Race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .ICEauthority file.

Basic Data

PublishedApril 25, 2006
Last ModifiedOctober 03, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-362
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score3.7
SeverityLOW
Exploitability Score1.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm2.14*******

Vulnerable Software List

VendorProductVersions
Gnome Gdm 2.14

References

NameSourceURLTags
http://cvs.gnome.org/viewcvs/gdm2/daemon/slave.c?r1=1.260&r2=1.261http://cvs.gnome.org/viewcvs/gdm2/daemon/slave.c?r1=1.260&r2=1.261CONFIRM
DSA-1040http://www.debian.org/security/2006/dsa-1040DEBIANPATCH Vendor Advisory
MDKSA-2006:083http://www.mandriva.com/security/advisories?name=MDKSA-2006:083MANDRIVA
RHSA-2007:0286http://www.redhat.com/support/errata/RHSA-2007-0286.htmlREDHAT
17635http://www.securityfocus.com/bid/17635BID
ADV-2006-1465http://www.vupen.com/english/advisories/2006/1465VUPENVendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188303https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188303CONFIRM
gdm-slavec-symlink(26092)https://exchange.xforce.ibmcloud.com/vulnerabilities/26092XF
oval:org.mitre.oval:def:10092https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10092OVAL
USN-278-1https://usn.ubuntu.com/278-1/UBUNTU
FEDORA-2006-338https://www.redhat.com/archives/fedora-announce-list/2006-April/msg00160.htmlFEDORAPATCH