CVE-2013-4259
Published: 16 September 2013
runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.
Notes
Author | Note |
---|---|
seth-arnold | 'low' because Ubuntu kernels have symlink and hardlink protections |
Priority
Status
Package | Release | Status |
---|---|---|
ansible Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(1.5.4+dfsg-1)
|
|
upstream |
Released
(1.2.3)
|
|
This vulnerability is mitigated in part by the use of symlink restrictions in Ubuntu. This vulnerability is mitigated in part by the use of hardlink restrictions in Ubuntu. |