Vulnerability Name: | CVE-2015-0296 (CCN-101240) | ||||||||||||
Assigned: | 2014-11-18 | ||||||||||||
Published: | 2015-02-27 | ||||||||||||
Updated: | 2017-11-01 | ||||||||||||
Summary: | The pre-install script in texlive 3.1.20140525_r34255.fc21 as packaged in Fedora 21 and rpm, and texlive 6.20131226_r32488.fc20 and rpm allows local users to delete arbitrary files via a crafted file in the user's home directory. | ||||||||||||
CVSS v3 Severity: | 4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)
| ||||||||||||
CVSS v2 Severity: | 1.2 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N) 0.9 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-0296 Source: FEDORA Type: Third Party Advisory FEDORA-2015-4332 Source: FEDORA Type: Third Party Advisory FEDORA-2015-4872 Source: CCN Type: texlive GIT Repository Drop scriptlet that touches /home Source: CCN Type: oss-security Mailing List, Fri, 27 Feb 2015 19:55:04 +0530 CVE-2015-0296 preinstall scriptlet in texlive-base rpm of fedora allows unprivileged user to delete arbitrary files(maybe others) Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150227 CVE-2015-0296 preinstall scriptlet in texlive-base rpm of fedora allows unprivileged user to delete arbitrary files(maybe others) Source: BID Type: Third Party Advisory, VDB Entry 72826 Source: CCN Type: BID-72826 TeX Live CVE-2015-0296 Local Arbitrary File Deletion Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1197082 (CVE-2015-0296) CVE-2015-0296 texlive rpm scriptlet allows unprivileged user to delete arbitrary files Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1197082 Source: XF Type: UNKNOWN texlive-cve20150296-file-deletion(101240) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |