Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-4536

Опубликовано: 31 дек. 2005
Источник: debian
EPSS Низкий

Описание

Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libmail-audit-perlfixed2.1-5.1package

EPSS

Процентиль: 23%
0.00072
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.

nvd
больше 19 лет назад

Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.

github
больше 3 лет назад

Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.

EPSS

Процентиль: 23%
0.00072
Низкий