Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-4358


freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) freebsd-update upgrade (upgrade) operation.


Published

2009-12-20T02:30:00.547

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.4

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System freebsd freebsd 6.3 Yes
Operating System freebsd freebsd 6.4 Yes
Operating System freebsd freebsd 7.1 Yes
Operating System freebsd freebsd 7.2 Yes
Operating System freebsd freebsd 8.0 Yes

References