as31 2.3.1-4 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496 - | |
| References | () http://www.openwall.com/lists/oss-security/2012/01/24/11 - | |
| References | () http://www.openwall.com/lists/oss-security/2012/01/24/7 - | |
| References | () http://www.openwall.com/lists/oss-security/2012/07/05/1 - | |
| References | () http://www.openwall.com/lists/oss-security/2012/07/06/3 - | |
| References | () http://www.openwall.com/lists/oss-security/2012/08/31/9 - | 
Information
                Published : 2012-03-19 19:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-0808
Mitre link : CVE-2012-0808
CVE.ORG link : CVE-2012-0808
JSON object : View
Products Affected
                bdale_garbee
- as31
CWE
                
                    
                        
                        CWE-59
                        
            Improper Link Resolution Before File Access ('Link Following')
