Weak Permission Management in Gnash Plugin Allows Local Information Exposure
CVE-2011-4328

Currently unrated

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
16 June 2012

Summary

The Gnash plugin prior to version 0.8.10 possesses a vulnerability where cookie files are created with weak permissions in the /tmp directory, making them world-readable. This allows local users to access certain sensitive information stored in these cookies. The predictable naming convention of the cookie files exacerbates the issue, as it simplifies the process for attackers to exploit this weakness to extract sensitive data from the system.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.