CVE-2001-0132

Interscan VirusWall 3.6.x and earlier follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trend_micro:interscan_viruswall:*:*:*:*:*:*:*:*
cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2001-01/0235.html - Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2001-01/0235.html - Vendor Advisory
References () http://www.securityfocus.com/bid/2213 - Vendor Advisory () http://www.securityfocus.com/bid/2213 - Vendor Advisory

Information

Published : 2001-03-12 05:00

Updated : 2024-11-20 23:34


NVD link : CVE-2001-0132

Mitre link : CVE-2001-0132

CVE.ORG link : CVE-2001-0132


JSON object : View

Products Affected

trend_micro

  • interscan_viruswall