Weak Permission Management in Gnash Plugin Allows Local Information Exposure
CVE-2011-4328
Currently unrated
Summary
The Gnash plugin prior to version 0.8.10 possesses a vulnerability where cookie files are created with weak permissions in the /tmp directory, making them world-readable. This allows local users to access certain sensitive information stored in these cookies. The predictable naming convention of the cookie files exacerbates the issue, as it simplifies the process for attackers to exploit this weakness to extract sensitive data from the system.
References
Timeline
Vulnerability published
Vulnerability Reserved