2 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf. ppc64-diag 2.6.1 utiliza permisos 0775 para /tmp/diagSEsnap y no restringe debidamente permisos para /tmp/diagSEsnap/snapH.tar.gz, lo que permite a usuarios locales obtener información sensible mediante la lectura de ficheros en este archivo, tal y como fue demostrado por /var/log/messages y /etc/yaboot.conf. Multiple insecure temporary file use flaws were found in the way the ppc64-diag utility created certain temporary files. A local attacker could possibly use either of these flaws to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running ppc64-diag, or obtain sensitive information from the temporary files. • http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html http://openwall.com/lists/oss-security/2014/06/17/1 http://rhn.redhat.com/errata/RHSA-2015-0383.html http://rhn.redhat.com/errata/RHSA-2015-1320.html http://secunia.com/advisories/60616 http://www.securityfocus.com/bid/68086 https://bugzilla.redhat.com/show_bug.cgi?id=1109371 https://access.redhat.com/security/cve/CVE-2014-4039 • CWE-264: Permissions, Privileges, and Access Controls CWE-377: Insecure Temporary File •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras. ppc64-diag 2.6.1 permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico relacionado con (1) rtas_errd/diag_support.c y /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc y /tmp/diagSEsnap/snapH.tar.gz o (3) lpd/test/lpd_ela_test.sh y /var/tmp/ras. Multiple insecure temporary file use flaws were found in the way the ppc64-diag utility created certain temporary files. A local attacker could possibly use either of these flaws to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running ppc64-diag, or obtain sensitive information from the temporary files. • http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html http://openwall.com/lists/oss-security/2014/06/17/1 http://rhn.redhat.com/errata/RHSA-2015-0383.html http://rhn.redhat.com/errata/RHSA-2015-1320.html http://secunia.com/advisories/60616 http://www.securityfocus.com/bid/68049 https://bugzilla.novell.com/show_bug.cgi?id=882667 https://bugzilla.redhat.com/show_bug.cgi?id=1109371 https://access.redhat.com/security/cve/CVE-2014-4038 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •