script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/16280 | vdb entry third party advisory broken link |
http://www.redhat.com/support/errata/RHSA-2005-782.html | vendor advisory broken link |
http://seclists.org/bugtraq/2001/Dec/0123.html | third party advisory mailing list |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723 | vdb entry signature broken link |
http://seclists.org/bugtraq/2001/Dec/0122.html | third party advisory mailing list |
http://secunia.com/advisories/16785 | third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7718 | vdb entry third party advisory |
http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm | third party advisory |
http://secunia.com/advisories/18502 | third party advisory broken link |