sealert in setroubleshoot 2.0.5 allows local users to overwrite arbitrary files via a symlink attack on the sealert.log temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/42591 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9705 | vdb entry signature |
http://secunia.com/advisories/30339 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=288221 | |
http://securitytracker.com/id?1020077 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2008-0061.html | patch vendor advisory |
http://www.securityfocus.com/bid/29320 | vdb entry |