Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4108

Опубликовано: 18 сент. 2008
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 7.2

Описание

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

ignored

karmic

not-affected

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

karmic

not-affected

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

oneiric

not-affected

precise

DNE

upstream

released

Показывать по

Ссылки на источники

EPSS

Процентиль: 18%
0.00057
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

nvd
почти 17 лет назад

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

debian
почти 17 лет назад

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) i ...

github
около 3 лет назад

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

EPSS

Процентиль: 18%
0.00057
Низкий

7.2 High

CVSS2