Vulnerability CVE-2014-1640


Published: 2014-01-27   Modified: 2014-01-28

Description:
axiom-test.sh in axiom 20100701-1.1 uses tempfile to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Getting tempfile/mktemp wrong
Helmut
22.01.2014

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
4.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Debian -> Axiom 

 References:
http://xforce.iss.net/xforce/xfdb/90663
http://www.osvdb.org/102383
http://www.openwall.com/lists/oss-security/2014/01/22/4
http://www.openwall.com/lists/oss-security/2014/01/22/3
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358

Copyright 2021, cxsecurity.com

 

Back to Top