hugin, as used on various operating systems including SUSE openSUSE 10.2 and 10.3, allows local users to overwrite arbitrary files via a symlink attack on the hugin_debug_optim_results.txt temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://secunia.com/advisories/27623 | third party advisory vendor advisory |
http://security.gentoo.org/glsa/glsa-200712-01.xml | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00199.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=362851 | |
http://secunia.com/advisories/27952 | third party advisory vendor advisory |
http://secunia.com/advisories/27653 | third party advisory vendor advisory |
http://secunia.com/advisories/27229 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/26730 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=332401 | |
http://www.novell.com/linux/security/advisories/2007_20_sr.html | vendor advisory |
http://osvdb.org/42224 | vdb entry |