First published: Sat Oct 15 2011(Updated: )
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/hardlink | 0.3.2 | |
CentOS Hardlink | <0.1.2 | |
Red Hat Enterprise Linux | =6.0 | |
Debian | =8.0 | |
Red Hat Enterprise Linux | =5.0 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3632 is a local vulnerability that poses a medium threat level, allowing attackers to conduct symlink attacks.
To address CVE-2011-3632, update the hardlink package to version 0.3.2 or later.
CVE-2011-3632 affects hardlink versions prior to 0.1.2, as well as specific versions of Red Hat and Debian Linux distributions.
CVE-2011-3632 requires local access for exploitation, making it a local vulnerability.
CVE-2011-3632 allows local attackers to perform symlink attacks, potentially leading to unauthorized access to files.