First published: Wed Oct 20 2004(Updated: )
The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.6i | |
OpenSSL | =0.9.7c | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.6f | |
OpenSSL | =0.9.6l | |
OpenSSL | =0.9.6e | |
OpenSSL | =0.9.7d | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.6k | |
OpenSSL | =0.9.6g | |
OpenSSL | =0.9.6h | |
OpenSSL | =0.9.6j | |
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6m | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =10.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =10.0 | |
Gentoo Linux | ||
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0975 has a moderate severity level due to its potential for local attackers to exploit symlink vulnerabilities.
To fix CVE-2004-0975, update the OpenSSL package to a version that addresses this vulnerability.
CVE-2004-0975 affects Trustix Secure Linux and specific versions of the OpenSSL package across various operating systems.
CVE-2004-0975 cannot be exploited remotely as it requires local access to the system.
CVE-2004-0975 enables a symlink attack, allowing local users to overwrite files via insecure handling of temporary files.