mail.local in NetBSD versions 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows local users to change ownership of or append data to arbitrary files on the target system via a symlink attack on the user mailbox.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-006.txt.asc | vendor advisory |
http://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/40141/ | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/40385/ | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/92101 | vdb entry third party advisory |
http://akat1.pl/?id=2 | third party advisory exploit |
http://www.securitytracker.com/id/1036429 | vdb entry third party advisory |
http://www.rapid7.com/db/modules/exploit/unix/local/netbsd_mail_local | exploit vdb entry third party advisory |