First published: Fri Dec 31 2004(Updated: )
Multiple scripts on SuSE Linux 9.0 allow local users to overwrite arbitrary files via a symlink attack on (1) /tmp/fvwm-bug created by fvwm-bug, (2) /tmp/wmmenu created by wm-oldmenu2new, (3) /tmp/rates created by x11perfcomp, (4) /tmp/xf86debug.1.log created by xf86debug, (5) /tmp/.winpopup-new created by winpopup-send.sh, or (6) /tmp/initrd created by lvmcreate_initrd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2097 is considered to be a moderate severity vulnerability due to the potential for local users to exploit file overwriting through symlink attacks.
To fix CVE-2004-2097, it is recommended to update or patch the affected scripts in SuSE Linux 9.0 to eliminate the symlink attack vectors.
CVE-2004-2097 affects local users of SuSE Linux 9.0 who have access to the vulnerable scripts.
The exploitation method for CVE-2004-2097 involves using a symlink attack on certain temporary files created by scripts.
CVE-2004-2097 involves multiple scripts including fvwm-bug, wm-oldmenu2new, x11perfcomp, and xf86debug.