src/common/latex.py in Gajim 0.15 allows local users to overwrite arbitrary files via a symlink attack on a temporary latex file, related to the get_tmpfile_name function.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/04/10/6 | mailing list |
http://hg.gajim.org/gajim/rev/f046e4aaf7d4 | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079241.html | vendor advisory |
http://www.securityfocus.com/bid/53017 | vdb entry |
http://secunia.com/advisories/48794 | third party advisory |
https://trac.gajim.org/changeset/13759/src/common/latex.py | |
http://security.gentoo.org/glsa/glsa-201208-04.xml | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74869 | vdb entry |
http://secunia.com/advisories/48695 | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079169.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/04/10/15 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079237.html | vendor advisory |