First published: Wed Jan 11 2006(Updated: )
The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =4.10-release | |
FreeBSD Kernel | =4.10-release_p8 | |
FreeBSD Kernel | =4.10-releng | |
FreeBSD Kernel | =4.11-release_p3 | |
FreeBSD Kernel | =4.11-releng | |
FreeBSD Kernel | =4.11-stable | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.0-alpha | |
FreeBSD Kernel | =5.0-release_p14 | |
FreeBSD Kernel | =5.0-releng | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.1-alpha | |
FreeBSD Kernel | =5.1-release | |
FreeBSD Kernel | =5.1-release_p5 | |
FreeBSD Kernel | =5.1-releng | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.2.1-release | |
FreeBSD Kernel | =5.2.1-releng | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.3-release | |
FreeBSD Kernel | =5.3-releng | |
FreeBSD Kernel | =5.3-stable | |
FreeBSD Kernel | =5.4-pre-release | |
FreeBSD Kernel | =5.4-release | |
FreeBSD Kernel | =5.4-releng | |
FreeBSD Kernel | =6.0-release | |
FreeBSD Kernel | =6.0-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0055 is considered a moderate severity vulnerability due to the potential for local users to overwrite arbitrary files.
To fix CVE-2006-0055, you should update your FreeBSD system to a version that addresses this vulnerability.
CVE-2006-0055 affects FreeBSD versions ranging from 4.10 to 6.0.
CVE-2006-0055 cannot be exploited remotely as it requires local access to the system.
CVE-2006-0055 involves a symlink attack which allows local users to manipulate file writes.