axiom-test.sh in axiom 20100701-1.1 uses tempfile to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename.
References
Configurations
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358 - | |
References | () http://www.openwall.com/lists/oss-security/2014/01/22/3 - | |
References | () http://www.openwall.com/lists/oss-security/2014/01/22/4 - | |
References | () http://www.osvdb.org/102383 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90663 - |
Information
Published : 2014-01-28 00:55
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1640
Mitre link : CVE-2014-1640
CVE.ORG link : CVE-2014-1640
JSON object : View
Products Affected
debian
- axiom
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')