Page 2 of 7 results (0.006 seconds)

CVSS: 1.9EPSS: 0%CPEs: 4EXPL: 0

The writeFile function in core/smb4kfileio.cpp in Smb4K before 0.8.0 does not preserve /etc/sudoers permissions across modifications, which allows local users to obtain sensitive information (/etc/sudoers contents) by reading this file. La función writeFile en core/smb4kfileio.cpp de Smb4K before 0.8.0 no preserva permisos /etc/sudoers a través de modificaciones, que permite a usuarios locales obtener información confidencial (contenido de /etc/sudoers) leyendo ese fichero. • http://developer.berlios.de/bugs/?func=detailbug&bug_id=9630&group_id=769 http://developer.berlios.de/project/shownotes.php?release_id=11706 http://developer.berlios.de/project/shownotes.php?release_id=11902 http://developer.berlios.de/project/shownotes.php?release_id=9777 http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html http://secunia.com/advisories/23937 http://secunia.com/advisories/23984 http://secunia.com/advisories/24111 http://secunia.com/advisories/24469& •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

smb4k 0.4 and other versions before 0.6.3 allows local users to read sensitive files via a symlink attack on the (1) smb4k.tmp or (2) sudoers temporary files. • http://secunia.com/advisories/16724 http://secunia.com/advisories/17636 http://smb4k.berlios.de http://www.gentoo.org/security/en/glsa/glsa-200511-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:157 http://www.securityfocus.com/bid/14756 •