Certain patch-installation scripts in Oracle Solaris allow local users to append data to arbitrary files via a symlink attack on the /tmp/CLEANUP temporary file, related to use of Update Manager.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/510311/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/38928 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/57149 | vdb entry |
http://www.securityfocus.com/archive/1/510305/100/0/threaded | mailing list |