Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-08-18 04:00
Updated : 2024-02-28 10:24
NVD link : CVE-2004-0233
Mitre link : CVE-2004-0233
CVE.ORG link : CVE-2004-0233
JSON object : View
Products Affected
sgi
- propack
slackware
- slackware_linux
utempter
- utempter
CWE