CVE-2012-2760
Publication date 25 July 2012
Last updated 24 July 2024
Ubuntu priority
mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids.
Status
Package | Ubuntu Release | Status |
---|---|---|
libapache2-mod-auth-openid | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
libapache2-mod-auth-openid |
References
Other references
- https://github.com/bmuller/mod_auth_openid/pull/30
- https://github.com/bmuller/mod_auth_openid/blob/master/ChangeLog
- http://www.exploit-db.com/exploits/18917
- http://secunia.com/advisories/49247
- http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html
- http://archives.neohapsis.com/archives/fulldisclosure/2012-05/0235.html
- https://www.cve.org/CVERecord?id=CVE-2012-2760