First published: Tue Jul 03 2007(Updated: )
The populate_conns function in src/populate_conns.c in GSAMBAD 0.1.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gsambadtmp temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =4.0 | |
GSAMBAD GSAMBAD | =0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.