Show plain JSON{"acknowledgement": "This issue was discovered by Kurt Seifried (Red Hat Security Response Team) and Michael Scherer (Red Hat Regional IT team).", "affected_release": [{"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2:client:el5", "package": "glusterfs-0:3.3.0.7rhs-1.el5", "product_name": "Native Client for RHEL 5 for Red Hat Storage", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:3:client:el6", "package": "glusterfs-0:3.3.0.7rhs-1.el6", "product_name": "Native Client for RHEL 6 for Red Hat Storage", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "appliance-0:1.7.1-1.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "augeas-0:0.9.0-1.el6", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "glusterfs-0:3.3.0.7rhs-1.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "gluster-swift-0:1.4.8-5.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "libvirt-0:0.9.10-21.el6_3.8", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "rhn-client-tools-0:1.0.0-73.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "sanlock-0:2.3-4.el6_3", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "sos-0:2.2-17.2.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:server:el6", "package": "vdsm-0:4.9.6-20.el6rhs", "product_name": "Red Hat Storage 2.0", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:console:el6", "package": "org.ovirt.engine-root-0:2.0.techpreview1-4", "product_name": "Red Hat Storage 2.0 Console", "release_date": "2013-03-28T00:00:00Z"}, {"advisory": "RHSA-2013:0691", "cpe": "cpe:/a:redhat:storage:2.0:console:el6", "package": "vdsm-0:4.9.6-20.el6rhs", "product_name": "Red Hat Storage 2.0 Console", "release_date": "2013-03-28T00:00:00Z"}], "bugzilla": {"description": "GlusterFS: insecure temporary file creation", "id": "886364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886364"}, "csaw": false, "cvss": {"cvss_base_score": "2.1", "cvss_scoring_vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "status": "verified"}, "cwe": "CWE-377", "details": ["The GlusterFS functionality in Red Hat Storage Management Console 2.0, Native Client, and Server 2.0 allows local users to overwrite arbitrary files via a symlink attack on multiple temporary files created by (1) tests/volume.rc, (2) extras/hook-scripts/S30samba-stop.sh, and possibly other vectors, different vulnerabilities than CVE-2012-4417.", "Multiple insecure temporary file creation flaws were found in Red Hat Storage. A local user on the Red Hat Storage server could use these flaws to cause arbitrary files to be overwritten as the root user via a symbolic link attack."], "name": "CVE-2012-5635", "public_date": "2013-03-28T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-5635\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-5635"], "threat_severity": "Low"}