Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-4579

Опубликовано: 15 окт. 2008
Источник: debian

Описание

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
redhat-clusterfixed2.20081102-1package
redhat-clusterfixed2.20080801-4+lenny1lennypackage
redhat-clusterno-dsaetchpackage

Связанные уязвимости

ubuntu
почти 17 лет назад

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

redhat
почти 17 лет назад

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

nvd
почти 17 лет назад

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

github
больше 3 лет назад

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

oracle-oval
почти 16 лет назад

ELSA-2009-1341: cman security, bug fix, and enhancement update (LOW)