Vulnerability CVE-2008-4108


Published: 2008-09-18   Modified: 2012-02-12

Description:
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

See advisories in our WLB2 database:
Topic
Author
Date
High
python-2.3.4-5 Symbolic link attack possibility
Jan iankko Liesk...
19.09.2008

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Python software foundation -> Python 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=462326
http://xforce.iss.net/xforce/xfdb/45161
http://www.vupen.com/english/advisories/2008/2659
http://www.securitytracker.com/id?1020904
http://www.securityfocus.com/bid/31184
http://securityreason.com/securityalert/4274
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899

Copyright 2024, cxsecurity.com

 

Back to Top