Directory traversal vulnerability in utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to overwrite arbitrary files via a .. (dot dot) in the --save argument, related to the --session-dir argument, a different vulnerability than CVE-2011-1760.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/05/03/1 | mailing list |
http://openwall.com/lists/oss-security/2011/05/10/7 | mailing list patch |
https://bugzilla.redhat.com/show_bug.cgi?id=700883 | patch exploit |
http://openwall.com/lists/oss-security/2011/05/11/1 | mailing list |
http://secunia.com/advisories/45205 | third party advisory |
http://openwall.com/lists/oss-security/2011/05/10/6 | mailing list |
http://www.ubuntu.com/usn/USN-1166-1 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 | exploit |
http://www.debian.org/security/2011/dsa-2254 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67979 | vdb entry |