Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-4328

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2011-4328
Last Modified 07 Jan 2014 11:23:59
Published 15 Jun 2012 08:55:05
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2011-4328

Summary

plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.

Vulnerable Systems

Application

  • Gnu Gnash 0.8.5

  • Gnu Gnash 0.8.7

  • Gnu Gnash 0.8.8

  • Gnu Gnash 0.8.9


References

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=755518

BID - 50747

OSVDB - 77243

MLIST - [oss-security] 20111121 CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies

MLIST - [oss-security] 20111121 Re: CVE Request (minor) -- gnash -- Unsafe management of HTTP cookies

DEBIAN - DSA-2435

SECUNIA - 48466

SECUNIA - 48325

SUSE - openSUSE-SU-2012:0369

SUSE - openSUSE-SU-2012:0330

CONFIRM - http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55

MISC - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384


Last Updated: 27 May 2016 10:56:31