freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
References
Configurations
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496389 - | |
References | () http://dev.gentoo.org/~rbu/security/debiantemp/freeradius-dialupadmin - | |
References | () http://lists.debian.org/debian-devel/2008/08/msg00271.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html - | |
References | () http://secunia.com/advisories/32170 - | |
References | () http://secunia.com/advisories/33151 - | |
References | () http://uvw.ru/report.lenny.txt - | |
References | () http://www.openwall.com/lists/oss-security/2008/10/30/2 - | |
References | () http://www.securityfocus.com/bid/30901 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=235770 - |
Information
Published : 2008-10-07 21:11
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4474
Mitre link : CVE-2008-4474
CVE.ORG link : CVE-2008-4474
JSON object : View
Products Affected
freeradius
- freeradius
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')