Описание
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-4536
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24380
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029
- http://secunia.com/advisories/18652
- http://secunia.com/advisories/18656
- http://www.debian.org/security/2006/dsa-960
- http://www.securityfocus.com/bid/16434
- http://www.vupen.com/english/advisories/2006/0378
EPSS
CVE ID
Связанные уязвимости
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enable ...
EPSS