uudecode, as available in the sharutils package before 4.2.1, does not check whether the filename of the uudecoded file is a pipe or symbolic link, which could allow attackers to overwrite files or execute commands.
References
Configurations
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-040.0.txt - | |
References | () http://marc.info/?l=bugtraq&m=103599320902432&w=2 - | |
References | () http://online.securityfocus.com/advisories/4132 - | |
References | () http://www.aerasec.de/security/index.html?id=ae-200204-033&lang=en - | |
References | () http://www.iss.net/security_center/static/9075.php - | |
References | () http://www.kb.cert.org/vuls/id/336083 - US Government Resource | |
References | () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-052.php - | |
References | () http://www.osvdb.org/8274 - | |
References | () http://www.redhat.com/support/errata/RHSA-2002-065.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-180.html - | |
References | () http://www.securityfocus.com/bid/4742 - |
Information
Published : 2002-05-29 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0178
Mitre link : CVE-2002-0178
CVE.ORG link : CVE-2002-0178
JSON object : View
Products Affected
gnu
- sharutils
CWE