CVE-2015-7758
low-risk
Published 2016-01-08
Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.3/10
Low
LOCAL
/ LOW complexity
Affected Vendors
References (14)
Vendor Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756432
Vendor Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756432
23
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
10/34 · Low