First published: Tue Jul 03 2007(Updated: )
The populate_conns function in src/populate_conns.c in GSAMBAD 0.1.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gsambadtmp temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
Debian Linux | =4.0 | |
GSAMBAD | =0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2838 has a moderate severity level due to the potential for local users to overwrite arbitrary files.
To fix CVE-2007-2838, ensure that the GSAMBAD application is updated to a version that addresses the symlink vulnerability.
CVE-2007-2838 affects local users of GSAMBAD version 0.1.4 on Debian Linux 4.0.
CVE-2007-2838 is associated with a symlink attack that exploits the handling of temporary files.
The vulnerable application in CVE-2007-2838 is GSAMBAD version 0.1.4.