The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/08/14/1 | mailing list |
http://code.google.com/p/tunnelblick/issues/detail?id=212 | |
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html | mailing list exploit |