
CVE-2009-5081 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5081
30 Jun 2011 — The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969. Los scripts (1) config.guess ,(2) contrib / groffer / perl / groffer.pl, y (3) contrib/groffer/perl/roff2.pl en GNU ... • http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-5082 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5082
30 Jun 2011 — The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file. Las secuencias de comandos (1) configure y (2) config.guess en GNU troff (también conocido como groff) v1.20.1 en Openwall GNU/*/Linux (también conocido como Owl) crea archivos temporales de forma inapropiada mediante... • http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-5079 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5079
30 Jun 2011 — The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file. Las secuencias de comandos (1) gendef.sh, (2) doc/fixinfo.sh, y (3) contrib/gdiffmk/tests/runtests.in en GNU troff (también conocido como groff) v1.21 y anteriores permite a usuarios locales sobrescribir archivos a través de un ataque "symlink" en un archivo tempor... • http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-5078 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5078
30 Jun 2011 — contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 launches the Ghostscript program without the -dSAFER option, which allows remote attackers to create, overwrite, rename, or delete arbitrary files via a crafted document. contrib/pdfmark/pdfroff.sh en GNU troff (también conocido como groff) antes de v1.21 lanza el programa Ghostscript sin la opcion -dSAFER, lo que permite a usuarios remotos crear, sobrescribir, renombrar o eliminar archivos de su elección a través de un documento manipulado. OS... • ftp://ftp.gnu.org/gnu/groff/groff-1.20.1-1.21.diff.gz • CWE-254: 7PK - Security Features •

CVE-2009-5080 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5080
30 Jun 2011 — The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296. Los scripts (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, y (3) contrib/pic... • http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-5044 – Gentoo Linux Security Advisory 201310-14
https://notcve.org/view.php?id=CVE-2009-5044
24 Jun 2011 — contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file. contrib/pdfmark/pdfroff.sh en GNU troff (también conocido como groff) antes de v1.21 permite sobreescribir ficheros de su elección a los usuarios locales a través de un ataque de enlace simbólico sobre un fichero temporal pdf#####.tmp . OS X Yosemite 10.10.5 and Security Update 2015-006 is now available and addresses vulnerabilities in Apache,... • ftp://ftp.gnu.org/gnu/groff/groff-1.20.1-1.21.diff.gz • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2011-1095 – glibc: insufficient quoting in the locale command output
https://notcve.org/view.php?id=CVE-2011-1095
10 Apr 2011 — locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function. locale/programs/locale.c en la librería C GNU (también conocido como glibc o libc6) anterior a v2.13 no formatea su salida, permitiendo a usuarios locales ganar privilegios mediante una variable de entorno localizati... • http://bugs.gentoo.org/show_bug.cgi?id=330923 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-1089 – glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE
https://notcve.org/view.php?id=CVE-2011-1089
10 Apr 2011 — The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296. La función addmntent en la biblioteca C de GNU (también conocida como glibc o libc6) v2.13 y anteriores no informa de un estado de error de intentos fal... • http://openwall.com/lists/oss-security/2011/03/04/10 • CWE-16: Configuration •

CVE-2011-0536 – GNU C library dynamic linker - '$ORIGIN' Expansion
https://notcve.org/view.php?id=CVE-2011-0536
08 Apr 2011 — Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: ... • https://www.exploit-db.com/exploits/15274 • CWE-426: Untrusted Search Path •

CVE-2011-1071 – GNU glibc < 2.12.2 - 'fnmatch()' Stack Corruption
https://notcve.org/view.php?id=CVE-2011-1071
08 Apr 2011 — The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. La Biblioteca C (también se conoce como glibc o libc6) anterior a versión 2.12.2 y Embedded GLIBC (E... • https://www.exploit-db.com/exploits/17120 • CWE-399: Resource Management Errors •