First published: Thu Jun 30 2011(Updated: )
The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
groff | =1.20.1 | |
Openwall Owl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-5082 is considered a moderate severity vulnerability due to its potential for local user exploitation via a symlink attack.
To fix CVE-2009-5082, ensure you update to a patched version of GNU troff later than 1.20.1 that mitigates the symlink vulnerability.
CVE-2009-5082 affects GNU troff version 1.20.1 when deployed on Openwall GNU/*/Linux systems.
CVE-2009-5082 enables a local symlink attack, allowing users to overwrite arbitrary files.
Any local user with access to the system running the affected version of GNU troff can exploit CVE-2009-5082.