autojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2013-2012 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2012 | third party advisory |
http://www.openwall.com/lists/oss-security/2013/04/25/14 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83827 | third party advisory vdb entry |
https://github.com/wting/autojump/commit/ad09ee27d402be797b3456abff6edeb4291edfec | third party advisory patch |
https://github.com/wting/autojump/commit/c763b2afadb188ab52849c21d43d2e8fe5b8800a | third party advisory patch |