Vulnerability Name:

CVE-2002-0157 (CCN-8995)

Assigned:2002-05-02
Published:2002-05-02
Updated:2008-09-05
Summary:Nautilus 1.0.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on the .nautilus-metafile.xml metadata file.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: Rapid 7 Advisory R7-0003
Nautilus Symlink Vulnerability

Source: MITRE
Type: CNA
CVE-2002-0157

Source: CCN
Type: GNOME Web site
/cvs/gnome/ nautilus/

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20020502 R7-0003: Nautilus Symlink Vulnerability

Source: CCN
Type: RHSA-2002-064
Updated Nautilus for symlink vulnerability writing metadata files

Source: XF
Type: UNKNOWN
nautilus-metafile-xml-symlink(8995)

Source: CCN
Type: OSVDB ID: 5354
Nautilus .nautilus-metafile.xml Symlink Overwrite Arbitrary File

Source: REDHAT
Type: UNKNOWN
RHSA-2002:064

Source: BID
Type: Patch, Vendor Advisory
4373

Source: CCN
Type: BID-4373
Nautilus Local File Corruption Vulnerability

Source: XF
Type: UNKNOWN
nautilus-metafile-xml-symlink(8995)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:eazel:nautilus:1.0.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnome:nautilus:1.0.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    eazel nautilus 1.0.4
    gnome nautilus 1.0.4
    redhat linux 7
    redhat linux 7.1
    slackware slackware linux 8.0
    redhat linux 7.2
    redhat linux 7.3