First published: Mon Dec 31 2001(Updated: )
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
util-linux | <=2.11m | |
kernel util-linux | <2.11n | |
Avaya CVLAN | ||
Avaya Integrated Management Suite | ||
Avaya Interactive Response | ||
Avaya Intuity LX | ||
Avaya Message Networking | ||
Avaya Modular Messaging Message Storage Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1494 is classified as a moderate severity vulnerability due to the potential for local users to overwrite arbitrary files.
To fix CVE-2001-1494, upgrade the util-linux package to version 2.11n or later.
Affected users include those running util-linux versions prior to 2.11n, as well as several Avaya products that utilize this package.
CVE-2001-1494 allows local users to exploit the script command by creating a hardlink from the typescript log file to any arbitrary file.
CVE-2001-1494 cannot be directly exploited remotely as it requires local access to the system.