First published: Wed Nov 14 2007(Updated: )
buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite arbitrary files via a symlink attack on the (1) scan.pnm and (2) scan.jpg temporary files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora Core | =f7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6131 has a high severity due to potential local privilege escalation and arbitrary file overwrite vulnerabilities.
To fix CVE-2007-6131, update to a patched version of scanbuttond or modify buttonpressed.sh to prevent symlink attacks.
CVE-2007-6131 affects systems running Red Hat Fedora Core 7 with scanbuttond version 0.2.3.
CVE-2007-6131 is not remotely exploitable as it requires local user access to execute the symlink attack.
A symlink attack in CVE-2007-6131 involves creating symbolic links to redirect temporary file writes to unauthorized locations.