First published: Wed Apr 16 2014(Updated: )
Jakub Wilk discovered that clang's scan-build utility insecurely handled temporary files. A local attacker could use this flaw to perform a symbolic link attack against users running the scan-build utility. Original report: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744817</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Clang |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1088105 is considered medium due to the potential for local attackers to exploit the vulnerability.
To fix REDHAT-BUG-1088105, users should update to the latest patched version of clang that addresses the temporary file handling issue.
Users running the scan-build utility in clang are affected by REDHAT-BUG-1088105.
No, REDHAT-BUG-1088105 cannot be exploited remotely as it requires local access to the system.
REDHAT-BUG-1088105 enables a symbolic link attack which could be used by local attackers.