id3lib Symlink Bug May Let Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1018667 |
SecurityTracker URL: http://securitytracker.com/id/1018667
|
CVE Reference:
CVE-2007-4460
(Links to External Site)
|
Date: Sep 10 2007
|
Impact:
Modification of user information, User access via local system
|
|
Version(s): 3.8.3
|
Description:
A vulnerability was reported in id3lib. A local user may be able to obtain elevated privileges on the target system.
The software creates a temporary file in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to a temporary file to be used by id3lib. When id3lib is run, the symlinked file will be overwritten with the privileges of the target user or application using id3lib.
The RenderV2ToFile() function in 'tag_file.cpp' is affected.
Nikolaus Schulz reported this vulnerability.
|
Impact:
A local user may be able to obtain elevated privileges on the target system.
|
Solution:
No solution was available at the time of this entry.
|
Vendor URL: id3lib.sourceforge.net/ (Links to External Site)
|
Cause:
Access control error, State error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|