First published: Wed Feb 14 2001(Updated: )
Interscan VirusWall 3.6.x and earlier follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | <=3.6 | |
Trend Micro InterScan VirusWall Scan Engine | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0132 is considered to have a medium severity due to the potential for local users to manipulate files.
CVE-2001-0132 affects Interscan VirusWall versions 3.6.x and earlier.
To fix CVE-2001-0132, update Interscan VirusWall to a version later than 3.6.x.
The impact of CVE-2001-0132 allows local users to overwrite arbitrary files through a symlink attack during the uninstallation process.
CVE-2001-0132 is a local vulnerability, as it requires local user access to exploit.