CVE-2009-3289Incorrect Permission Assignment in Glib

Severity
7.8HIGHNVD
EPSS
0.1%
top 77.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 22
Latest updateMay 2

Description

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
GHSA-q7q8-g4m3-j3pq: The g_file_copy function in glib 22022-05-02
OSV
CVE-2009-3289: The g_file_copy function in glib 22009-09-22
CVEList
CVE-2009-3289: The g_file_copy function in glib 22009-09-22

📋Vendor Advisories

3
Ubuntu
GLib vulnerability2009-10-05
Red Hat
glib2: folder | symlink permissions change after copy via nautilus2009-08-28
Debian
CVE-2009-3289: glib2.0 - The g_file_copy function in glib 2.0 sets the permissions of a target file to th...2009

💬Community

1
Bugzilla
CVE-2009-3289 glib2: folder | symlink permissions change after copy via nautilus2009-09-22
CVE-2009-3289 — Incorrect Permission Assignment in Glib | cvebase