Vulnerability Name:

CVE-2012-0787 (CCN-89221)

Assigned:2012-07-19
Published:2012-07-19
Updated:2019-04-22
Summary:The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.6 Low (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:N)
1.9 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: Augeas Web site
Augeas

Source: CONFIRM
Type: UNKNOWN
http://augeas.net/news.html

Source: MITRE
Type: CNA
CVE-2012-0787

Source: REDHAT
Type: Vendor Advisory
RHSA-2013:1537

Source: SECUNIA
Type: Vendor Advisory
55811

Source: CCN
Type: Red Hat Bugzilla Bug 772257
(CVE-2012-0786) CVE-2012-0786 augeas: susceptible to symlink attack

Source: CONFIRM
Type: Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=772261

Source: XF
Type: UNKNOWN
augeas-clonefile-information-disclosure(89221)

Source: CONFIRM
Type: Exploit, Patch
https://github.com/hercules-team/augeas/commit/b8de6a8c

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:augeas:augeas:0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:0.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:augeas:augeas:*:*:*:*:*:*:*:* (Version <= 0.10.0)

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:6::hypervisor:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:storage:3:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/a:redhat:storage:3:server:el6:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:augeas:augeas:0.10.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:27387
    P
    ELSA-2013-1537 -- augeas security, bug fix, and enhancement update (low)
    2014-12-15
    oval:org.mitre.oval:def:26916
    P
    RHSA-2013:1537 -- augeas security, bug fix, and enhancement update (Low)
    2014-12-08
    oval:com.ubuntu.precise:def:20120787000
    V
    CVE-2012-0787 on Ubuntu 12.04 LTS (precise) - low.
    2013-11-23
    oval:com.ubuntu.trusty:def:20120787000
    V
    CVE-2012-0787 on Ubuntu 14.04 LTS (trusty) - low.
    2013-11-23
    oval:com.ubuntu.xenial:def:201207870000000
    V
    CVE-2012-0787 on Ubuntu 16.04 LTS (xenial) - low.
    2013-11-23
    oval:com.ubuntu.xenial:def:20120787000
    V
    CVE-2012-0787 on Ubuntu 16.04 LTS (xenial) - low.
    2013-11-23
    oval:com.redhat.rhsa:def:20131537
    P
    RHSA-2013:1537: augeas security, bug fix, and enhancement update (Low)
    2013-11-21
    BACK
    redhat enterprise linux 6.0
    augeas augeas 0.0.1
    augeas augeas 0.0.2
    augeas augeas 0.0.3
    augeas augeas 0.0.4
    augeas augeas 0.0.5
    augeas augeas 0.0.6
    augeas augeas 0.0.7
    augeas augeas 0.0.8
    augeas augeas 0.1.0
    augeas augeas 0.1.1
    augeas augeas 0.2.0
    augeas augeas 0.2.1
    augeas augeas 0.2.2
    augeas augeas 0.3.0
    augeas augeas 0.3.1
    augeas augeas 0.3.2
    augeas augeas 0.3.3
    augeas augeas 0.3.4
    augeas augeas 0.3.5
    augeas augeas 0.3.6
    augeas augeas 0.4.0
    augeas augeas 0.4.1
    augeas augeas 0.4.2
    augeas augeas 0.5.0
    augeas augeas 0.5.1
    augeas augeas 0.5.2
    augeas augeas 0.5.3
    augeas augeas 0.6.0
    augeas augeas 0.7.0
    augeas augeas 0.7.1
    augeas augeas 0.7.2
    augeas augeas 0.7.3
    augeas augeas 0.7.4
    augeas augeas 0.8.0
    augeas augeas 0.8.1
    augeas augeas 0.9.0
    augeas augeas *
    augeas augeas 0.10.0