/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/332198 - | |
References | () http://bugs.debian.org/505071 - | |
References | () http://bugs.debian.org/505271 - | |
References | () http://osvdb.org/52200 - | |
References | () http://security.gentoo.org/glsa/glsa-200903-24.xml - | |
References | () http://securityreason.com/securityalert/4695 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:062 - | |
References | () http://www.securityfocus.com/archive/1/498769/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/32552 - | |
References | () http://www.ubuntu.com/usn/usn-695-1 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47037 - | |
References | () https://www.exploit-db.com/exploits/7313 - |
Information
Published : 2008-12-09 00:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5394
Mitre link : CVE-2008-5394
CVE.ORG link : CVE-2008-5394
JSON object : View
Products Affected
debian
- shadow
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')