The internal_dump function in Mathopd before 1.5p5, and 1.6x before 1.6b6 BETA, when Mathopd is running with the -n option, allows local users to overwrite arbitrary files via a symlink attack on dump files that are triggered by a SIGWINCH signal.
References
Link | Resource |
---|---|
http://secunia.com/advisories/14524 | Broken Link Third Party Advisory |
http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html | Third Party Advisory |
http://secunia.com/advisories/14524 | Broken Link Third Party Advisory |
http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/14524 - Broken Link, Third Party Advisory | |
References | () http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html - Third Party Advisory |
26 Jan 2024, 17:00
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 5.5 |
References | (SECUNIA) http://secunia.com/advisories/14524 - Broken Link, Third Party Advisory |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0824
Mitre link : CVE-2005-0824
CVE.ORG link : CVE-2005-0824
JSON object : View
Products Affected
mathopd
- mathopd
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')