In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1136 | third party advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612032 | patch mailing list exploit third party advisory |
https://bugs.launchpad.net/ubuntu/+source/tesseract/+bug/607297 | third party advisory issue tracking exploit |