Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gnu:groff:*:*:*:*:*:*:*:*", "matchCriteriaId": "66EE516B-88DB-47BC-AC1D-66B7C8E39AB1", "versionEndIncluding": "1.21", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "35017C15-4CCD-4B44-9108-F5650319A009", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B8AC4613-F1BE-4EEE-84C3-A13D2AC048B8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.11a:*:*:*:*:*:*:*", "matchCriteriaId": "2D6BD17C-0DE9-405D-BC02-E996FBC4F97A", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "5493392A-B8E1-4F71-A1ED-6889FD1CC217", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "BDF86410-1841-4549-A0FE-3D16C6CCE383", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C91EE2C2-DE96-494D-BEEE-D07ED74EDEAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EDB1389A-0F7D-4616-8553-AF1E40B05256", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D4A1AC6-2820-4992-B652-EF6FD308D643", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "59A32AD0-B019-4FAF-BC8A-01FE6F90628E", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "A81CEA14-F694-431F-BAC9-BBB8CC09BBCB", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A17D1-F3A9-45FC-A943-C47B8121599C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D64601D-0EA0-40AD-9E25-74360051CC2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D944298-B544-4D38-96A3-5CA22C9C3C7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "6F737E42-B8F1-4C9C-B3E9-382BCE43859D", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnu:groff:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ECE4B65-2CE6-44B6-B29E-97ECA0014C1D", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969."}, {"lang": "es", "value": "Los scripts (1) config.guess ,(2) contrib / groffer / perl / groffer.pl, y (3) contrib/groffer/perl/roff2.pl en GNU troff (tambi\u00e9n conocido como groff) v1.21 y anteriores, utilizan un n\u00famero insuficiente de X caracteres en el argumento plantilla (template) en la funci\u00f3n tempfile, lo que hace m\u00e1s f\u00e1cil para los usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simb\u00f3licos en un archivo temporal, una vulnerabilidad diferente a CVE-2004-0969."}], "id": "CVE-2009-5081", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-06-30T15:55:01.770", "references": [{"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff"}, {"source": "cve@mitre.org", "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2009/08/14/4"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2009/08/14/5"}, {"source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:086"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2009/08/14/4"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://openwall.com/lists/oss-security/2009/08/14/5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:086"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-59"}], "source": "nvd@nist.gov", "type": "Primary"}]}