Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756432 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2015-12/msg00117.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178582.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00150.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178642.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2015/10/08/5 | mailing list |
http://www.openwall.com/lists/oss-security/2015/10/08/4 | mailing list |