Lucene search

K
ubuntuUbuntuUSN-357-1
HistoryOct 05, 2006 - 12:00 a.m.

Mono vulnerability

2006-10-0500:00:00
ubuntu.com
33

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

12.7%

Releases

  • Ubuntu 6.06
  • Ubuntu 5.10

Details

Sebastian Krahmer of the SuSE security team discovered that the
System.CodeDom.Compiler classes used temporary files in an insecure
way. This could allow a symbolic link attack to create or overwrite
arbitrary files with the privileges of the user invoking the program.
Under some circumstances, a local attacker could also exploit this to
inject arbitrary code into running Mono processes.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchmono-classlib-2.0< 1.1.13.6-0ubuntu3.1UNKNOWN
Ubuntu6.06noarchmono-classlib-1.0< 1.1.13.6-0ubuntu3.1UNKNOWN
Ubuntu5.10noarchmono-classlib-2.0< 1.1.8.3-1ubuntu2.1UNKNOWN
Ubuntu5.10noarchmono-classlib-1.0< 1.1.8.3-1ubuntu2.1UNKNOWN

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

12.7%