CVE-2015-0267
kexec-tools: insecure use of /tmp/*$$* filenames
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Red Hat module-setup.sh script for kexec-tools, as distributed in the kexec-tools before 2.0.7-19 packages in Red Hat Enterprise Linux, allows local users to write to arbitrary files via a symlink attack on a temporary file.
La secuencia de comandos de module-setup.sh de Red Hat para kexec-tools, distribuido en los paquetes kexec-tools anterior a 2.0.7-19 en Red Hat Enterprise Linux, permite a usuarios locales escribir en ficheros arbitrarios a través de un ataque de enlace simbólico sobre un fichero temporal.
It was found that the module-setup.sh script provided by kexec-tools created temporary files in an insecure way. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-11-18 CVE Reserved
- 2015-05-13 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-377: Insecure Temporary File
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/74622 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-0986.html | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2015-0267 | 2015-05-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1191575 | 2015-05-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Kexec-tools Search vendor "Redhat" for product "Kexec-tools" | <= 2.0.7-11 Search vendor "Redhat" for product "Kexec-tools" and version " <= 2.0.7-11" | - |
Affected
|