CVE-2012-0871Link Following in Project Systemd

CWE-59Link Following7 documents6 sources
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 68.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 18
Latest updateMay 13

Description

The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.

CVSS vector

AV:L/AC:M/C:N/I:C/A:CExploitability: 3.4 | Impact: 9.2

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
GHSA-jv9q-v37q-34vv: The session_link_x11_socket function in login/logind-session2022-05-13
CVEList
CVE-2012-0871: The session_link_x11_socket function in login/logind-session2014-04-18
OSV
CVE-2012-0871: The session_link_x11_socket function in login/logind-session2014-04-18

📋Vendor Advisories

1
Debian
CVE-2012-0871: systemd - The session_link_x11_socket function in login/logind-session.c in systemd-logind...2012

💬Community

2
Bugzilla
CVE-2012-0871 systemd: insecure file creation may lead to elevated privileges [fedora-all]2012-03-01
Bugzilla
CVE-2012-0871 systemd: insecure file creation may lead to elevated privileges2012-02-21
CVE-2012-0871 — Link Following in Project Systemd | cvebase