Lucene search

K
mageiaGentoo FoundationMGASA-2013-0224
HistoryJul 21, 2013 - 1:25 p.m.

Updated python-suds package fixes security vulnerability

2013-07-2113:25:10
Gentoo Foundation
advisories.mageia.org
13

1.2 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.1%

An insecure temporary directory use flaw was found in the way python-suds performed initialization of its internal file-based URL cache (predictable location was used for directory to store the cached files). A local attacker could use this flaw to conduct symbolic link attacks, possibly leading to their ability for example the SOAP .wsdl metadata to redirect queries to a different host, than originally intended (CVE-2013-2217).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchpython-suds< 0.4.1-2.1python-suds-0.4.1-2.1.mga2
Mageia3noarchpython-suds< 0.4.1-3.1python-suds-0.4.1-3.1.mga3

1.2 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.1%