Vulnerability CVE-2010-0118


Published: 2010-02-24   Modified: 2012-02-13

Description:
Bournal before 1.4.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified temporary files associated with a --hack_the_gibson update check.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Bournal Insecure Temporary Files Security Issue
Secunia
28.02.2010

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
4.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Becauseinter -> Bournal 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036697.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036701.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036764.html
http://www.securityfocus.com/archive/1/509685/100/0/threaded
http://www.securityfocus.com/bid/38353

Copyright 2024, cxsecurity.com

 

Back to Top