First published: Tue Feb 15 2005(Updated: )
The tpkg-* scripts in the toolchain-source 3.0.4 package on Debian GNU/Linux 3.0 allow local users to overwrite arbitrary files via a symlink attack on temporary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian toolchain-source | =3.0.3-2 | |
Debian toolchain-source | =3.0.4 | |
Debian toolchain-source | =3.0.3-3 | |
Debian toolchain-source | =3.0.3-1 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0159 is considered a medium-severity vulnerability due to the risk of file overwrites by local users.
To mitigate CVE-2005-0159, upgrade the toolchain-source package to a fixed version that addresses the symlink vulnerability.
The affected versions are toolchain-source 3.0.3-1, 3.0.3-2, and 3.0.4 on Debian GNU/Linux 3.0.
Local users on systems running the vulnerable versions of toolchain-source are affected by CVE-2005-0159.
CVE-2005-0159 can be exploited using a symlink attack on temporary files created by the tpkg-* scripts.