The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=mutt-dev&m=115999486426292&w=2 - | |
References | () http://secunia.com/advisories/22613 - | |
References | () http://secunia.com/advisories/22640 - | |
References | () http://secunia.com/advisories/22685 - | |
References | () http://secunia.com/advisories/22686 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:190 - | |
References | () http://www.trustix.org/errata/2006/0061/ - | |
References | () http://www.ubuntu.com/usn/usn-373-1 - |
Information
Published : 2006-10-16 19:07
Updated : 2024-11-21 00:18
NVD link : CVE-2006-5298
Mitre link : CVE-2006-5298
CVE.ORG link : CVE-2006-5298
JSON object : View
Products Affected
mutt
- mutt
CWE