CVE Reference: CVE-2011-4944

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2011-4944

Description:
Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-1613-2
  http://www.ubuntu.com/usn/USN-1596-1
  http://www.ubuntu.com/usn/USN-1592-1
  http://www.ubuntu.com/usn/USN-1613-1
  http://www.ubuntu.com/usn/USN-1615-1
  http://www.ubuntu.com/usn/USN-1616-1

SAID
  Secunia Advisory: SA51089
  Secunia Advisory: SA50858
  Secunia Advisory: SA51024
  Secunia Advisory: SA51040
  Secunia Advisory: SA51087

MLIST
  http://www.openwall.com/lists/oss-security/2012/03/27/10
  http://www.openwall.com/lists/oss-security/2012/03/27/5
  http://www.openwall.com/lists/oss-security/2012/03/27/2

MISC
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555

CONFIRM
  http://bugs.python.org/issue13512
  http://bugs.python.org/file23824/pypirc-secure.diff

APPLE
  http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html


Return to the previous page.