First published: Tue Apr 26 2005(Updated: )
The (1) check_update.sh and (2) rkhunter script in Rootkit Hunter before 1.2.3-r1 create temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rootkit Hunter | =1.2.1 | |
Rootkit Hunter | =1.2.3 | |
Rootkit Hunter | =1.2 | |
Rootkit Hunter | =1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1270 has a medium severity level due to its potential for local file overwriting via a symlink attack.
To fix CVE-2005-1270, upgrade to Rootkit Hunter version 1.2.3-r1 or later.
CVE-2005-1270 affects Rootkit Hunter versions 1.2, 1.2.1, 1.2.2, and 1.2.3.
The risks associated with CVE-2005-1270 include unauthorized file modification and a potential compromise of system integrity.
CVE-2005-1270 exploits the system by allowing local users to perform a symlink attack to overwrite arbitrary files.