The e_hostname function in commands.c in BitchX 1.1a allows local users to overwrite arbitrary files via a symlink attack on temporary files when using the (1) HOSTNAME or (2) IRCHOST command.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449149 | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.285737 | vendor advisory |
http://secunia.com/advisories/34870 | third party advisory |
http://secunia.com/advisories/27463 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/26326 | vdb entry |
http://secunia.com/advisories/31180 | third party advisory |
http://www.vupen.com/english/advisories/2007/3714 | vdb entry |
http://osvdb.org/42061 | vdb entry |
http://security.gentoo.org/glsa/glsa-200807-12.xml | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38262 | vdb entry |