Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-5298

Опубликовано: 16 окт. 2006
Источник: debian
EPSS Низкий

Описание

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
muttfixed1.5.13-1.1package
muttno-dsasargepackage

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

nvd
почти 19 лет назад

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

github
больше 3 лет назад

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

EPSS

Процентиль: 19%
0.0006
Низкий