Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-1838

Опубликовано: 11 мар. 2014
Источник: debian
EPSS Низкий

Описание

The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
logilab-commonfixed0.61.0-1package
logilab-commonno-dsasqueezepackage
logilab-commonno-dsawheezypackage

EPSS

Процентиль: 16%
0.0005
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.

nvd
почти 12 лет назад

The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.

CVSS3: 5.6
github
больше 3 лет назад

Improper Link Resolution Before File Access in logilab-commons

EPSS

Процентиль: 16%
0.0005
Низкий