CVE Vulnerabilities

CVE-2013-0927

Improper Link Resolution Before File Access ('Link Following')

Published: Apr 10, 2013 | Modified: Nov 07, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

Google Chrome OS before 26.0.1410.57 relies on a Pango pango-utils.c read_config implementation that loads the contents of the .pangorc file in the users home directory, and the file referenced by the PANGO_RC_FILE environment variable, which allows attackers to bypass intended access restrictions via crafted configuration data.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Chrome_os Google * 26.0.1410.56 (including)
Chrome_os Google 26.0.1410.0 (including) 26.0.1410.0 (including)
Chrome_os Google 26.0.1410.1 (including) 26.0.1410.1 (including)
Chrome_os Google 26.0.1410.3 (including) 26.0.1410.3 (including)
Chrome_os Google 26.0.1410.4 (including) 26.0.1410.4 (including)
Chrome_os Google 26.0.1410.5 (including) 26.0.1410.5 (including)
Chrome_os Google 26.0.1410.6 (including) 26.0.1410.6 (including)
Chrome_os Google 26.0.1410.7 (including) 26.0.1410.7 (including)
Chrome_os Google 26.0.1410.8 (including) 26.0.1410.8 (including)
Chrome_os Google 26.0.1410.9 (including) 26.0.1410.9 (including)
Chrome_os Google 26.0.1410.10 (including) 26.0.1410.10 (including)
Chrome_os Google 26.0.1410.11 (including) 26.0.1410.11 (including)
Chrome_os Google 26.0.1410.12 (including) 26.0.1410.12 (including)
Chrome_os Google 26.0.1410.14 (including) 26.0.1410.14 (including)
Chrome_os Google 26.0.1410.15 (including) 26.0.1410.15 (including)
Chrome_os Google 26.0.1410.16 (including) 26.0.1410.16 (including)
Chrome_os Google 26.0.1410.17 (including) 26.0.1410.17 (including)
Chrome_os Google 26.0.1410.18 (including) 26.0.1410.18 (including)
Chrome_os Google 26.0.1410.19 (including) 26.0.1410.19 (including)
Chrome_os Google 26.0.1410.20 (including) 26.0.1410.20 (including)
Chrome_os Google 26.0.1410.21 (including) 26.0.1410.21 (including)
Chrome_os Google 26.0.1410.22 (including) 26.0.1410.22 (including)
Chrome_os Google 26.0.1410.23 (including) 26.0.1410.23 (including)
Chrome_os Google 26.0.1410.24 (including) 26.0.1410.24 (including)
Chrome_os Google 26.0.1410.25 (including) 26.0.1410.25 (including)
Chrome_os Google 26.0.1410.26 (including) 26.0.1410.26 (including)
Chrome_os Google 26.0.1410.27 (including) 26.0.1410.27 (including)
Chrome_os Google 26.0.1410.28 (including) 26.0.1410.28 (including)
Chrome_os Google 26.0.1410.29 (including) 26.0.1410.29 (including)
Chrome_os Google 26.0.1410.30 (including) 26.0.1410.30 (including)
Chrome_os Google 26.0.1410.31 (including) 26.0.1410.31 (including)
Chrome_os Google 26.0.1410.32 (including) 26.0.1410.32 (including)
Chrome_os Google 26.0.1410.33 (including) 26.0.1410.33 (including)
Chrome_os Google 26.0.1410.34 (including) 26.0.1410.34 (including)
Chrome_os Google 26.0.1410.35 (including) 26.0.1410.35 (including)
Chrome_os Google 26.0.1410.36 (including) 26.0.1410.36 (including)
Chrome_os Google 26.0.1410.37 (including) 26.0.1410.37 (including)
Chrome_os Google 26.0.1410.38 (including) 26.0.1410.38 (including)
Chrome_os Google 26.0.1410.39 (including) 26.0.1410.39 (including)
Chrome_os Google 26.0.1410.40 (including) 26.0.1410.40 (including)
Chrome_os Google 26.0.1410.41 (including) 26.0.1410.41 (including)
Chrome_os Google 26.0.1410.42 (including) 26.0.1410.42 (including)
Chrome_os Google 26.0.1410.43 (including) 26.0.1410.43 (including)
Chrome_os Google 26.0.1410.44 (including) 26.0.1410.44 (including)
Chrome_os Google 26.0.1410.45 (including) 26.0.1410.45 (including)
Chrome_os Google 26.0.1410.46 (including) 26.0.1410.46 (including)
Chrome_os Google 26.0.1410.47 (including) 26.0.1410.47 (including)
Chrome_os Google 26.0.1410.48 (including) 26.0.1410.48 (including)
Chrome_os Google 26.0.1410.49 (including) 26.0.1410.49 (including)
Chrome_os Google 26.0.1410.50 (including) 26.0.1410.50 (including)
Chrome_os Google 26.0.1410.51 (including) 26.0.1410.51 (including)
Chrome_os Google 26.0.1410.52 (including) 26.0.1410.52 (including)
Chrome_os Google 26.0.1410.54 (including) 26.0.1410.54 (including)
Chrome_os Google 26.0.1410.55 (including) 26.0.1410.55 (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References