First published: Wed Sep 12 2007(Updated: )
reported via secalert By default, the sealert program writes diagnostic messages to the file /tmp/sealert.log. It does not check to ensure that this file does not already exist, or that it is not a symbolic link. An unprivileged local attacker can exploit this flaw to cause arbitrary files writable by other users to be overwritten when those users run sealert. The sealert program is run automatically, without user action, as part of the default RHEL 5 GNOME desktop session. It does not appear to be possible for the attacker to cause arbitrary data to be written to sealert.log, but the previous contents of the file are erased.'
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat sealert |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-288221 is considered moderate due to the potential for local attackers to exploit it.
To fix REDHAT-BUG-288221, ensure that the /tmp/sealert.log file does not exist before running the sealert program.
An unprivileged local attacker can exploit REDHAT-BUG-288221 to overwrite arbitrary files on the system.
The affected software for REDHAT-BUG-288221 is the Red Hat sealert program.
Exploiting REDHAT-BUG-288221 can lead to unauthorized file overwriting, potentially resulting in data loss or system compromise.