High severity7.8NVD Advisory· Published Sep 22, 2009· Updated Apr 23, 2026
CVE-2009-3289
CVE-2009-3289
Description
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Affected products
4- cpe:2.3:a:gnome:glib:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135nvdExploitIssue Tracking
- bugzilla.gnome.org/show_bug.cginvdExploitIssue Tracking
- lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.htmlnvdThird Party Advisory
- secunia.com/advisories/39656nvdBroken Link
- www.openwall.com/lists/oss-security/2009/09/08/8nvdMailing List
- www.vupen.com/english/advisories/2010/1001nvdPermissions Required
News mentions
0No linked articles in our index yet.