LutelWall 0.97 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://firewall.lutel.pl/download/0.98/ChangeLog | broken link |
http://security.gentoo.org/glsa/glsa-200506-10.xml | third party advisory vendor advisory |
http://securitytracker.com/id?1014112 | broken link third party advisory vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034424.html | not applicable mailing list |
http://www.zataz.net/adviso/lutelwall-05222005.txt | broken link |
http://secunia.com/advisories/15647 | third party advisory broken link |
http://secunia.com/advisories/15665 | third party advisory broken link |
http://www.securityfocus.com/bid/13863 | broken link third party advisory vdb entry |