Computer Security
[EN] securityvulns.ru no-pyccku


rPath Linux symbolic links vulnerability
Published:14.11.2008
Source:
SecurityVulns ID:9431
Type:local
Threat Level:
5/10
Description:rapa-console init script symbolic links vulnerability.
Affected:RPATH : rPath Appliance Platform Linux Service 1
 RPATH : rPath Appliance Platform Linux Service 2
 RPATH : rPath Linux 1
 RPATH : rPath Linux 2
CVE:CVE-2008-4832 (rc.sysinit in initscripts 8.12-8.21 and 8.56.15-0.1 on rPath allows local users to delete arbitrary files via a symlink attack on a directory under (1) /var/lock or (2) /var/run. NOTE: this issue exists because of a race condition in an incorrect fix for CVE-2008-3524. NOTE: exploitation may require an unusual scenario in which rc.sysinit is executed other than at boot time.)
 CVE-2008-3524 (rc.sysinit in initscripts before 8.76.3-1 on Fedora 9 and other Linux platforms allows local users to delete arbitrary files via a symlink attack on a file or directory under (1) /var/lock or (2) /var/run.)
Original documentdocumentRPATH, rPSA-2008-0318-1 initscripts (14.11.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod