everybuddy 0.4.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://securitytracker.com/id?1014110 | vendor advisory vdb entry third party advisory broken link |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034422.html | mailing list not applicable vendor advisory |
http://www.securityfocus.com/bid/13865 | vendor advisory vdb entry third party advisory broken link |
http://bugs.gentoo.org/show_bug.cgi?id=94473 | issue tracking exploit |
http://www.zataz.net/adviso/everybuddy-06062005.txt | broken link vendor advisory |