3 results (0.001 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

Certain third-party packages for CVSup 16.1h, such as SuSE Linux, contain untrusted paths in the ELF RPATH fields of certain executables, which could allow local users to execute arbitrary code by causing cvsup to link against malicious libraries that are created in world-writable directories such as /usr/src/packages. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0025.html http://marc.info/?l=bugtraq&m=107539776002450&w=2 http://www.securityfocus.com/bid/9523 https://exchange.xforce.ibmcloud.com/vulnerabilities/14994 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

sup 1.8 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files. sup 1.8 y anteriores no crea ficheros temporales de manera apropiada, lo que permite a usuarios locales sobreescribir ficheros arbitrarios. • http://www.debian.org/security/2003/dsa-353 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

cvsupd.sh in CVSup 1.2 allows local users to overwrite arbitrary files and gain privileges via a symlink attack on /var/tmp/cvsupd.out. • http://archives.neohapsis.com/archives/freebsd/2002-11/0011.html http://www.iss.net/security_center/static/10610.php http://www.securityfocus.com/bid/6150 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •