as31 2.3.1-4 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack.
References
Configurations
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496 - | |
References | () http://www.openwall.com/lists/oss-security/2012/01/24/11 - | |
References | () http://www.openwall.com/lists/oss-security/2012/01/24/7 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/05/1 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/06/3 - | |
References | () http://www.openwall.com/lists/oss-security/2012/08/31/9 - |
Information
Published : 2012-03-19 19:55
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0808
Mitre link : CVE-2012-0808
CVE.ORG link : CVE-2012-0808
JSON object : View
Products Affected
bdale_garbee
- as31
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')