First published: Wed Oct 20 2004(Updated: )
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0971 is classified as a high severity vulnerability due to its potential for local users to execute unauthorized file modifications.
To mitigate CVE-2004-0971, ensure that the krb5-send-pr script does not create temporary files in world-writable directories or apply available security patches from your Linux distribution.
CVE-2004-0971 affects Trustix Secure Linux versions 1.5 through 2.1 and potentially other operating systems that utilize vulnerable versions of the krb5 package.
In the context of CVE-2004-0971, a symlink attack allows a local user to create a symbolic link to a sensitive file, enabling them to overwrite it during the execution of the vulnerable script.
Yes, you can check for the presence of vulnerable versions of the krb5 package and review system logs for any unauthorized file modifications to determine if CVE-2004-0971 is exploited.