CVE-2012-0787Augeas vulnerability

10 documents6 sources
Severity
3.7LOWNVD
EPSS
0.1%
top 69.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 23
Latest updateMay 14

Description

The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.

CVSS vector

AV:L/AC:H/C:P/I:P/A:PExploitability: 1.9 | Impact: 6.4

Affected Packages3 packages

debiandebian/augeas< augeas 1.0.0-1 (bookworm)
Debianaugeas/augeas< 1.0.0-1+3
NVDaugeas/augeas0.10.0+36

Also affects: Enterprise Linux 6.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8qr9-h3xv-vhx6: The clone_file function in transfer2022-05-14
OSV
CVE-2012-0787: The clone_file function in transfer2013-11-23

📋Vendor Advisories

2
Red Hat
augeas: susceptible to mountpoint attack2012-07-19
Debian
CVE-2012-0787: augeas - The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_renam...2012

💬Community

5
Bugzilla
CVE-2012-6607 augeas: symlink attack on a .augsave file2013-11-25
Bugzilla
CVE-2012-0787 CVE-2012-0786 augeas: various flaws [epel-4]2013-11-22
Bugzilla
CVE-2012-0787 CVE-2012-0786 augeas: various flaws [epel-5]2013-11-22
Bugzilla
CVE-2012-0787 CVE-2012-0786 augeas: various flaws [fedora-all]2013-11-22
Bugzilla
CVE-2012-0787 augeas: susceptible to mountpoint attack2012-01-06