First published: Wed Sep 12 2001(Updated: )
UNIX news readers tin and rtin create the /tmp/.tin_log file with insecure permissions and follow symlinks, which allows attackers to modify the permissions of files writable by the user via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Runit | ||
Tin Tin | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1091 is considered a high severity vulnerability due to its potential to allow attackers to manipulate file permissions.
To fix CVE-1999-1091, ensure that the /tmp/.tin_log file has the appropriate permissions set to prevent symlink attacks.
CVE-1999-1091 affects the UNIX news readers tin version 1.2 and rtin.
CVE-1999-1091 facilitates symlink attacks that can lead to unauthorized modification of writable files.
Yes, CVE-1999-1091 can significantly compromise system integrity by allowing unauthorized users to alter important files.