fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2001-103.html | patch vendor advisory |
http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html |