The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
Configurations
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323 - | |
References | () http://marc.info/?l=bugtraq&m=110382652226638&w=2 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml - | |
References | () http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html - | |
References | () http://www.securityfocus.com/bid/11282 - Patch, Vendor Advisory | |
References | () http://www.trustix.org/errata/2004/0050 - | |
References | () http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 - | |
References | () https://www.ubuntu.com/usn/usn-5-1/ - |
Information
Published : 2005-02-09 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0966
Mitre link : CVE-2004-0966
CVE.ORG link : CVE-2004-0966
JSON object : View
Products Affected
ubuntu
- ubuntu_linux
gnu
- gettext
CWE