First published: Fri Feb 29 2008(Updated: )
expn in the am-utils and net-fs packages for Gentoo, rPath Linux, and other distributions, allows local users to overwrite arbitrary files via a symlink attack on the expn[PID] temporary file. NOTE: this is the same issue as CVE-2003-0308.1.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Rpath Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1078 is classified as a medium severity vulnerability due to the potential impact of local users overwriting arbitrary files.
To fix CVE-2008-1078, update the am-utils and net-fs packages to the latest versions provided by your distribution.
CVE-2008-1078 affects users of Gentoo Linux, Rpath Linux, and other distributions that utilize the vulnerable am-utils and net-fs packages.
CVE-2008-1078 is associated with a symlink attack that allows local users to exploit temporary file handling.
Yes, CVE-2008-1078 is a known vulnerability that is also documented as the same issue as CVE-2003-0308.