Access Restriction Bypass Affecting glib package, versions [,2.20.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-GLIB-2382564
  • published26 Jan 2022
  • disclosed22 Sept 2009
  • creditUnknown

Introduced: 22 Sep 2009

CVE-2009-3289  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade glib to version 2.20.0 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS Base Scores

version 3.1