DEBIAN-CVE-2019-3827

Source
https://security-tracker.debian.org/tracker/CVE-2019-3827
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-3827.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2019-3827
Upstream
Published
2019-03-25T18:29:00.887Z
Modified
2025-11-19T02:01:15.420679Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.

References

Affected packages

Debian:11 / gvfs

Package

Name
gvfs
Purl
pkg:deb/debian/gvfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gvfs

Package

Name
gvfs
Purl
pkg:deb/debian/gvfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gvfs

Package

Name
gvfs
Purl
pkg:deb/debian/gvfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / gvfs

Package

Name
gvfs
Purl
pkg:deb/debian/gvfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}