CVE-2004-0975

The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136302 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136302 -
References () http://secunia.com/advisories/12973 - () http://secunia.com/advisories/12973 -
References () http://www.debian.org/security/2004/dsa-603 - () http://www.debian.org/security/2004/dsa-603 -
References () http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml -
References () http://www.redhat.com/support/errata/RHSA-2005-476.html - () http://www.redhat.com/support/errata/RHSA-2005-476.html -
References () http://www.securityfocus.com/bid/11293 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11293 - Patch, Vendor Advisory
References () http://www.trustix.org/errata/2004/0050 - () http://www.trustix.org/errata/2004/0050 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10621 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10621 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A164 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A164 -

Information

Published : 2005-02-09 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0975

Mitre link : CVE-2004-0975

CVE.ORG link : CVE-2004-0975


JSON object : View

Products Affected

openssl

  • openssl

gentoo

  • linux

mandrakesoft

  • mandrake_linux
  • mandrake_multi_network_firewall
  • mandrake_linux_corporate_server