The (1) pj-gs.sh, (2) ps2epsi, (3) pv.sh, and (4) sysvlp.sh scripts in the ESP Ghostscript (espgs) package in Trustix Secure Linux 1.5 through 2.1, and other operating systems, allow local users to overwrite files via a symlink attack on temporary files.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284 | vdb entry signature |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 | vdb entry |
http://secunia.com/advisories/19799 | third party advisory vendor advisory |
http://www.trustix.org/errata/2004/0050 | vendor advisory |
http://secunia.com/advisories/20056 | third party advisory vendor advisory |
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321 | |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt | vendor advisory |
http://secunia.com/advisories/16997 | third party advisory vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-081.html | vendor advisory |
http://secunia.com/advisories/17135 | third party advisory vendor advisory |
https://www.ubuntu.com/usn/usn-3-1/ | vendor advisory |
http://www.securityfocus.com/bid/11285 | vdb entry patch vendor advisory |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt | vendor advisory |