← Back to CVEs
CVE-2011-4944
N/ADescription
Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
CVE Details
CVSS v3.1 ScoreN/A
Published8/27/2012
Last Modified4/11/2025
Sourcenvd
Honeypot Sightings0
Affected Products
python:python
Weaknesses (CWE)
CWE-264
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555(secalert@redhat.com)
http://bugs.python.org/file23824/pypirc-secure.diff(secalert@redhat.com)
http://bugs.python.org/issue13512(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html(secalert@redhat.com)
http://secunia.com/advisories/50858(secalert@redhat.com)
http://secunia.com/advisories/51024(secalert@redhat.com)
http://secunia.com/advisories/51040(secalert@redhat.com)
http://secunia.com/advisories/51087(secalert@redhat.com)
http://secunia.com/advisories/51089(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/10(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/2(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/27/5(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1592-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1596-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1613-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1613-2(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1615-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1616-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=758905(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.python.org/file23824/pypirc-secure.diff(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.python.org/issue13512(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50858(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51024(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51040(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51087(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51089(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/10(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/27/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1592-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1596-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1613-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1613-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1615-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1616-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=758905(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.