CVE-2012-2737Race Condition in Accountsservice

CWE-362Race Condition7 documents6 sources
Severity
1.9LOWNVD
EPSS
0.1%
top 78.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22
Latest updateMay 17

Description

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

CVSS vector

AV:L/AC:M/C:P/I:N/A:NExploitability: 3.4 | Impact: 2.9

Affected Packages3 packages

debiandebian/accountsservice< accountsservice 0.6.21-6 (bookworm)
Debiancanonical/accountsservice< 0.6.21-6+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-26ch-x2j2-w6vx: The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 02022-05-17
OSV
CVE-2012-2737: The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 02012-07-22

📋Vendor Advisories

2
Ubuntu
AccountsService vulnerability2012-06-28
Debian
CVE-2012-2737: accountsservice - The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon...2012

💬Community

2
Bugzilla
CVE-2012-2737 accountsservice: local file disclosure flaw [fedora-all]2012-06-28
Bugzilla
CVE-2012-2737 accountsservice: local file disclosure flaw2012-06-15