The log4sh_readProperties function in log4sh 1.2.5 and earlier allows local users to overwrite arbitrary files via a symlink attack on predictable log4sh.$$ filenames.
Link | Tags |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/034873.html | mailing list |
http://www.zataz.net/adviso/log4sh-06092005.txt | vendor advisory |
http://bugs.gentoo.org/show_bug.cgi?id=94069 | |
http://www.securityfocus.com/bid/14140 | vdb entry patch |
http://www.vupen.com/english/advisories/2005/0957 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2005-q3/0001.html | mailing list |
http://secunia.com/advisories/15899 | third party advisory vendor advisory |