Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2893

Опубликовано: 23 апр. 2014
Источник: debian

Описание

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
llvm-toolchain-snapshotfixed1:3.5~svn211669-1package
llvm-toolchain-3.3unfixedpackage
llvm-toolchain-3.4fixed1:3.4.2-1package

Связанные уязвимости

ubuntu
почти 12 лет назад

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.

redhat
почти 12 лет назад

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.

nvd
почти 12 лет назад

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.

github
больше 3 лет назад

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.