First published: Mon Apr 14 2014(Updated: )
Jakub Wilk discovered that clang's scan-build utility insecurely handled temporary files. A local attacker could use this flaw to perform a symbolic link attack against users running the scan-build utility. Original report: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/llvm-toolchain-3.3 | ||
SUSE Linux | =13.1 | |
Clang | <=3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2893 is considered a security vulnerability that can lead to local denial of service or unauthorized access due to improper handling of temporary files.
To mitigate CVE-2014-2893, update clang and llvm-toolchain to versions that are not affected by this vulnerability.
CVE-2014-2893 allows local attackers to perform symbolic link attacks against users running the scan-build utility.
CVE-2014-2893 affects clang versions up to 3.5 and the llvm-toolchain-3.3 in Debian and openSUSE 13.1.
CVE-2014-2893 was discovered by researcher Jakub Wilk.