First published: Sat Dec 31 2005(Updated: )
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Libmail-audit-perl | =2.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.