First published: Sat Feb 03 2007(Updated: )
Multiple race conditions in Smb4K before 0.8.0 allow local users to (1) modify arbitrary files via unspecified manipulations of Smb4K's lock file, which is not properly handled by the remove_lock_file function in core/smb4kfileio.cpp, and (2) add lines to the sudoers file via a symlink attack on temporary files, which isn't properly handled by the writeFile function in core/smb4kfileio.cpp.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Smb4K | =0.7 | |
Smb4K | =0.4 | |
Smb4K | =0.6 | |
Smb4K | =0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0472 allows local users to modify arbitrary files and potentially elevate privileges through a race condition vulnerability in Smb4K.
CVE-2007-0472 affects Smb4K versions 0.4, 0.5, 0.6, and 0.7.
To mitigate CVE-2007-0472, users should upgrade to Smb4K version 0.8.0 or later where the vulnerabilities have been addressed.
CVE-2007-0472 is a local vulnerability that can only be exploited by local users.
If you suspect exploitation of CVE-2007-0472, immediately upgrade Smb4K and review system logs for unauthorized file modifications.