cvsupd.sh in CVSup 1.2 allows local users to overwrite arbitrary files and gain privileges via a symlink attack on /var/tmp/cvsupd.out.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/6150 | patch vdb entry |
http://archives.neohapsis.com/archives/freebsd/2002-11/0011.html | mailing list |
http://www.iss.net/security_center/static/10610.php | vdb entry |