The (1) kantiword (kantiword.sh) and (2) gantiword (gantiword.sh) scripts in antiword 0.35 and earlier allow local users to overwrite arbitrary files via a symlink attack on temporary (a) output and (b) error files.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://secunia.com/advisories/15866 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/0242 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/16278 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24194 | vdb entry |
http://secunia.com/advisories/18530 | third party advisory patch vendor advisory |
http://www.debian.org/security/2005/dsa-945 | vendor advisory |