CVE-2008-4976

ogle 0.9.2 and ogle-mmx 0.9.2 allow local users to overwrite arbitrary files via a symlink attack on (a) /tmp/ogle_audio.#####, (b) /tmp/ogle_cli.#####, (c) /tmp/ogle_ctrl.#####, (d) /tmp/ogle_gui.#####, (e) /tmp/ogle_mpeg_ps.#####, (f) /tmp/ogle_mpeg_vs.#####, (g) /tmp/ogle_nav.#####, and (h) /tmp/ogle_vout.#####, temporary files, related to the (1) ogle_audio_debug, (2) ogle_cli_debug, (3) ogle_ctrl_debug, (4) ogle_gui_debug, (5) ogle_mpeg_ps_debug, (6) ogle_mpeg_vs_debug, (7) ogle_nav_debug, and (8) ogle_vout_debug scripts.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:alan_woodland:ogle:0.92:*:*:*:*:*:*:*
cpe:2.3:a:alan_woodland:ogle-mmx:0.92:*:*:*:*:*:*:*

History

21 Nov 2024, 00:52

Type Values Removed Values Added
References () http://bugs.debian.org/496420 - () http://bugs.debian.org/496420 -
References () http://bugs.debian.org/496425 - () http://bugs.debian.org/496425 -
References () http://dev.gentoo.org/~rbu/security/debiantemp/ogle - Exploit () http://dev.gentoo.org/~rbu/security/debiantemp/ogle - Exploit
References () http://dev.gentoo.org/~rbu/security/debiantemp/ogle-mmx - Exploit () http://dev.gentoo.org/~rbu/security/debiantemp/ogle-mmx - Exploit
References () http://uvw.ru/report.lenny.txt - () http://uvw.ru/report.lenny.txt -
References () http://www.openwall.com/lists/oss-security/2008/10/30/2 - () http://www.openwall.com/lists/oss-security/2008/10/30/2 -
References () http://www.securityfocus.com/bid/30926 - () http://www.securityfocus.com/bid/30926 -
References () https://bugs.gentoo.org/show_bug.cgi?id=235770 - () https://bugs.gentoo.org/show_bug.cgi?id=235770 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44832 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44832 -

Information

Published : 2008-11-06 15:55

Updated : 2024-11-21 00:52


NVD link : CVE-2008-4976

Mitre link : CVE-2008-4976

CVE.ORG link : CVE-2008-4976


JSON object : View

Products Affected

alan_woodland

  • ogle
  • ogle-mmx
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')