Show plain JSON{"id": "CVE-2008-1569", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.3, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-03-31T22:44:00.000", "references": [{"url": "http://secunia.com/advisories/29553", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/29738", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200804-11.xml", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2008/dsa-1531", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/43888", "source": "cve@mitre.org"}, {"url": "http://www.policyd-weight.org/", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/28480", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://bugs.gentoo.org/show_bug.cgi?id=214403", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41565", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/29553", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/29738", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200804-11.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2008/dsa-1531", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/43888", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.policyd-weight.org/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/28480", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugs.gentoo.org/show_bug.cgi?id=214403", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41565", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-59"}]}], "descriptions": [{"lang": "en", "value": "policyd-weight 0.1.14 beta-16 and earlier allows local users to modify or delete arbitrary files via a symlink attack on temporary files that are used when creating a socket."}, {"lang": "es", "value": "policyd-weight versiones 0.1.14 beta-16 y anteriores, permite a los usuarios locales modificar o eliminar archivos arbitrarios por medio de un ataque de tipo symlink en archivos temporales que se utilizan cuando se crea un socket."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F5114DA3-FBB9-47C4-857B-3212404DAD4E"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4D5F5A52-285E-4E7E-83B8-508079DBCEAE"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "674BE2D9-009B-46C5-A071-CB10368B8D48"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "703486E5-906B-4BDB-A046-28D4D73E3F03"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ABB5AC0D-2358-4C8E-99B5-2CE0A678F549"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "38B37184-BA88-44F1-AC9E-8B60C2419111"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D8C9247-3E18-4DD9-AF5B-B2996C76443F"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7B877A8-5318-402E-8AE1-753E7419060F"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A3938420-087D-4D92-A2F8-EAE54D9837EC"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4567FE5A-5061-4741-AA6D-4AB365579F8D"}, {"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:policyd-weight:policyd-weight:*:beta16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C01F2AD-6B48-459A-9047-FDA051C72A57", "versionEndIncluding": "0.1.14"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}