First published: Fri Oct 17 2008(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2008-4579">CVE-2008-4579</a> to the following vulnerability: The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file. References: <a href="http://bugs.gentoo.org/show_bug.cgi?id=240576">http://bugs.gentoo.org/show_bug.cgi?id=240576</a> <a href="http://www.openwall.com/lists/oss-security/2008/10/13/3">http://www.openwall.com/lists/oss-security/2008/10/13/3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fence | ||
Red Hat Cluster Manager (cman) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-467386 is considered high due to the potential for privilege escalation.
To fix REDHAT-BUG-467386, you should update the affected programs to the latest version provided by Red Hat.
REDHAT-BUG-467386 affects the Red Hat fence and Red Hat cman software.
The implications of REDHAT-BUG-467386 include unauthorized access and control over system resources.
While updates are the best fix, temporarily restricting access to the affected programs can serve as a workaround for REDHAT-BUG-467386.