The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff - Patch | |
References | () http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h - | |
References | () http://openwall.com/lists/oss-security/2009/08/14/4 - Patch | |
References | () http://openwall.com/lists/oss-security/2009/08/14/5 - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:086 - |
07 Nov 2023, 02:04
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2011-06-30 15:55
Updated : 2024-11-21 01:11
NVD link : CVE-2009-5081
Mitre link : CVE-2009-5081
CVE.ORG link : CVE-2009-5081
JSON object : View
Products Affected
gnu
- groff
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')