CVE-2015-9267
Published: 1 October 2018
Nullsoft Scriptable Install System (NSIS) before 2.49 uses temporary folder locations that allow unprivileged local users to overwrite files. This allows a local attack in which either a plugin or the uninstaller can be replaced by a Trojan horse program.
From the Ubuntu Security Team
It was discovered that NSIS incorrectly handled temporary folders. An attacker could possibly use this issue to execute arbitrary commands.
Priority
Status
Package | Release | Status |
---|---|---|
nsis Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(2.50-1)
|
cosmic |
Not vulnerable
(2.50-1)
|
|
disco |
Not vulnerable
(2.50-1)
|
|
eoan |
Not vulnerable
(2.50-1)
|
|
focal |
Not vulnerable
(2.50-1)
|
|
hirsute |
Not vulnerable
(2.50-1)
|
|
trusty |
Released
(2.46-7ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(2.49)
|
|
xenial |
Not vulnerable
(2.50-1)
|
|
groovy |
Not vulnerable
(2.50-1)
|
|
jammy |
Not vulnerable
(2.50-1)
|
|
impish |
Not vulnerable
(2.50-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |