policyd-weight 0.1.14 beta-16 and earlier allows local users to modify or delete arbitrary files via a symlink attack on temporary files that are used when creating a socket.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29553 - Vendor Advisory | |
References | () http://secunia.com/advisories/29738 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200804-11.xml - | |
References | () http://www.debian.org/security/2008/dsa-1531 - | |
References | () http://www.osvdb.org/43888 - | |
References | () http://www.policyd-weight.org/ - | |
References | () http://www.securityfocus.com/bid/28480 - Patch | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=214403 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41565 - |
Information
Published : 2008-03-31 22:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1569
Mitre link : CVE-2008-1569
CVE.ORG link : CVE-2008-1569
JSON object : View
Products Affected
debian
- debian_linux
policyd-weight
- policyd-weight
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')