Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:*:*:*:*:*:*:*:*", "matchCriteriaId": "44B39902-CE75-4ACC-8FF0-DEDCE6D4BEF9", "versionEndIncluding": "0.24", "vulnerable": true}, {"criteria": "cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "8E7ACFB5-27E5-44A0-9C35-6270BB5520A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "685F8494-C197-43C3-9D04-54A82EF0D9EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "94A2CD0F-8037-45F7-8DE0-12C938B3C010", "vulnerable": true}, {"criteria": "cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AAAB6195-632A-450F-B556-306E35957D57", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-0943 per ADT1/ADT2 due to different codebases and affected versions. CVE-2012-0943 is used for the guest-account issue."}, {"lang": "es", "value": "gdm/guest-session-cleanup.sh en gdm-guest-session 0.24 y anteriores, utilizado en Ubuntu Linux 10.04 LTS, 10.10 y 11.04, permite a usuarios locales eliminar archivos arbitrarios a trav\u00e9s de un espacio en el nombre de un archivo en /tmp. NOTA: este identificador fue dividido (SPLIT) de CVE-2012-0943 por ADT1/ADT2 debido a bases de c\u00f3digo y versiones afectadas diferentes. CVE-2012-0943 se utiliza para el asunto guest-account."}], "id": "CVE-2012-6648", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-05-22T23:55:03.003", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://ubuntu.com/usn/usn-1399-1"}, {"source": "cve@mitre.org", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/953044"}, {"source": "cve@mitre.org", "url": "https://launchpadlibrarian.net/96474113/gdm-guest-session.secure-cleanup.debdiff"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://ubuntu.com/usn/usn-1399-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/953044"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://launchpadlibrarian.net/96474113/gdm-guest-session.secure-cleanup.debdiff"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}