Show plain JSON{"id": "CVE-2012-2451", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2012-06-27T21:55:03.097", "references": [{"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/48990", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/02/6", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/81671", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/53361", "source": "cve@mitre.org"}, {"url": "http://www.ubuntu.com/usn/USN-1543-1", "source": "cve@mitre.org"}, {"url": "https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59", "tags": ["Exploit", "Patch"], "source": "cve@mitre.org"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=818386", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75328", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/48990", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/02/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/81671", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/53361", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-1543-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=818386", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75328", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries."}, {"lang": "es", "value": "El m\u00f3dulo Config::IniFiles antes de v2.71 para Perl crea archivos temporales con nombres predecibles, lo que permite a usuarios locales sobreescribir ficheros de su elecci\u00f3n mediante un ataque de enlace simb\u00f3lico. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros. NOTA: se ha informado de que esto s\u00f3lo podr\u00eda ser objeto de explotaci\u00f3n escribiendo en el mismo directorio que el archivo .INI. Si este es el caso, entonces este problema no puede cruzar los l\u00edmites de privilegios."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:shlomi_fish:config-inifiles:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DB8AB2E-7986-470B-A510-0B340F5540BA", "versionEndIncluding": "2.70"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}