First published: Sun Jul 10 2005(Updated: )
gen-index in GNATS 4.0, 4.1.0, and possibly earlier versions, when installed setuid, does not properly check files passed to the -o argument and opens the file with write access, which allows local users to overwrite arbitrary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GNATS | =4.0 | |
GNU GNATS | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2180 is considered a high severity vulnerability due to its potential for local users to overwrite arbitrary files.
To fix CVE-2005-2180, you should remove the setuid bit from the gen-index binary or upgrade to a patched version of GNATS.
CVE-2005-2180 affects GNU GNATS versions 4.0, 4.1.0, and possibly earlier versions.
Local users who have access to the system can exploit CVE-2005-2180 due to its nature of allowing unauthorized file overwriting.
The impact of CVE-2005-2180 includes the potential for local users to overwrite important system files, leading to data loss or system instability.