Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
References
Configurations
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899 - | |
References | () http://marc.info/?l=oss-security&m=122148330903513&w=2 - | |
References | () http://marc.info/?l=oss-security&m=122152861617434&w=2 - | |
References | () http://securityreason.com/securityalert/4274 - | |
References | () http://www.securityfocus.com/bid/31184 - | |
References | () http://www.securitytracker.com/id?1020904 - | |
References | () http://www.vupen.com/english/advisories/2008/2659 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=462326 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45161 - |
Information
Published : 2008-09-18 17:59
Updated : 2024-11-21 00:50
NVD link : CVE-2008-4108
Mitre link : CVE-2008-4108
CVE.ORG link : CVE-2008-4108
JSON object : View
Products Affected
python_software_foundation
- python
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')