← Volver a CVEs
CVE-2011-4944
N/ADescripcion
Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado8/27/2012
Ultima modificacion4/11/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
python:python
Debilidades (CWE)
CWE-264
Referencias
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555(secalert@redhat.com)
http://bugs.python.org/file23824/pypirc-secure.diff(secalert@redhat.com)
http://bugs.python.org/issue13512(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html(secalert@redhat.com)
http://secunia.com/advisories/50858(secalert@redhat.com)
http://secunia.com/advisories/51024(secalert@redhat.com)
http://secunia.com/advisories/51040(secalert@redhat.com)
http://secunia.com/advisories/51087(secalert@redhat.com)
http://secunia.com/advisories/51089(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/10(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/2(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/5(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1592-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1596-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1613-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1613-2(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1615-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1616-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=758905(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.python.org/file23824/pypirc-secure.diff(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.python.org/issue13512(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51024(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51040(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51087(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51089(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/10(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1592-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1596-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1613-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1613-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1615-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1616-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=758905(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.