CVE Vulnerabilities

CVE-2012-0786

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 23, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
3.3 LOW
AV:L/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
3.3 LOW
AV:L/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
AugeasAugeas*0.10.0 (including)
AugeasAugeas0.0.1 (including)0.0.1 (including)
AugeasAugeas0.0.2 (including)0.0.2 (including)
AugeasAugeas0.0.3 (including)0.0.3 (including)
AugeasAugeas0.0.4 (including)0.0.4 (including)
AugeasAugeas0.0.5 (including)0.0.5 (including)
AugeasAugeas0.0.6 (including)0.0.6 (including)
AugeasAugeas0.0.7 (including)0.0.7 (including)
AugeasAugeas0.0.8 (including)0.0.8 (including)
AugeasAugeas0.1.0 (including)0.1.0 (including)
AugeasAugeas0.1.1 (including)0.1.1 (including)
AugeasAugeas0.2.0 (including)0.2.0 (including)
AugeasAugeas0.2.1 (including)0.2.1 (including)
AugeasAugeas0.2.2 (including)0.2.2 (including)
AugeasAugeas0.3.0 (including)0.3.0 (including)
AugeasAugeas0.3.1 (including)0.3.1 (including)
AugeasAugeas0.3.2 (including)0.3.2 (including)
AugeasAugeas0.3.3 (including)0.3.3 (including)
AugeasAugeas0.3.4 (including)0.3.4 (including)
AugeasAugeas0.3.5 (including)0.3.5 (including)
AugeasAugeas0.3.6 (including)0.3.6 (including)
AugeasAugeas0.4.0 (including)0.4.0 (including)
AugeasAugeas0.4.1 (including)0.4.1 (including)
AugeasAugeas0.4.2 (including)0.4.2 (including)
AugeasAugeas0.5.0 (including)0.5.0 (including)
AugeasAugeas0.5.1 (including)0.5.1 (including)
AugeasAugeas0.5.2 (including)0.5.2 (including)
AugeasAugeas0.5.3 (including)0.5.3 (including)
AugeasAugeas0.6.0 (including)0.6.0 (including)
AugeasAugeas0.7.0 (including)0.7.0 (including)
AugeasAugeas0.7.1 (including)0.7.1 (including)
AugeasAugeas0.7.2 (including)0.7.2 (including)
AugeasAugeas0.7.3 (including)0.7.3 (including)
AugeasAugeas0.7.4 (including)0.7.4 (including)
AugeasAugeas0.8.0 (including)0.8.0 (including)
AugeasAugeas0.8.1 (including)0.8.1 (including)
AugeasAugeas0.9.0 (including)0.9.0 (including)
Red Hat Enterprise Linux 6RedHataugeas-0:1.0.0-5.el6*
Red Hat Storage 3 for RHEL 6RedHataugeas-0:1.0.0-5.el6*
RHEV 3.X Hypervisor and Agents for RHEL-6RedHataugeas-0:1.0.0-5.el6*
AugeasUbuntulucid*
AugeasUbuntuprecise*
AugeasUbuntuquantal*
AugeasUbuntuupstream*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References