Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6g5q-pc77-85j9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

EPSS

Процентиль: 21%
0.0007
Низкий

Дефекты

CWE-59

Связанные уязвимости

ubuntu
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

redhat
больше 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

nvd
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

debian
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 a ...

EPSS

Процентиль: 21%
0.0007
Низкий

Дефекты

CWE-59