First published: Fri Aug 18 2006(Updated: )
Globus Toolkit 3.2.x, 4.0.x, and 4.1.0 before 20060815 allow local users to obtain sensitive information (proxy certificates) and overwrite arbitrary files via a symlink attack on temporary files in the /tmp directory, as demonstrated by files created by (1) myproxy-admin-adduser, (2) grid-ca-sign, and (3) grid-security-config.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Globus Toolkit | =4.1.0 | |
Globus Toolkit | =3.2.0 | |
Globus Toolkit | =4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4233 is classified as a high severity vulnerability due to its potential to allow local users to obtain sensitive information and overwrite arbitrary files.
To fix CVE-2006-4233, users should upgrade to a patched version of Globus Toolkit released after August 15, 2006.
CVE-2006-4233 is associated with symlink attacks on temporary files, which can lead to information disclosure and file overwriting.
CVE-2006-4233 affects Globus Toolkit versions 3.2.x, 4.0.x, and 4.1.0 prior to the update released on August 15, 2006.
No, CVE-2006-4233 requires local access, meaning an attacker must have local user privileges to exploit the vulnerability.