First published: Tue Jul 29 2014(Updated: )
Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gummi | 0.8.1-1 0.8.3+really0.8.1-0.1 0.8.3+really0.8.3-3 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Gummi | =0.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7758 has been classified with a moderate severity level due to its exploitation potential via local users.
To mitigate CVE-2015-7758, upgrade Gummi to version 0.8.1-1 or later.
Gummi version 0.6.5 is specifically affected by CVE-2015-7758.
CVE-2015-7758 is not remotely exploitable as it requires local user access.
CVE-2015-7758 affects users on various Debian and openSUSE systems running Gummi version 0.6.5.