SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   id3lib Vendors:   id3lib.sourceforge.net
(Oracle Issues Fix for Solaris) id3lib Symlink Bug May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1029096
SecurityTracker URL:  http://securitytracker.com/id/1029096
CVE Reference:   CVE-2007-4460   (Links to External Site)
Date:  Sep 26 2013
Impact:   Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.8.3
Description:   A vulnerability was reported in id3lib. A local user may be able to obtain elevated privileges on the target system.

The software creates a temporary file in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to a temporary file to be used by id3lib. When id3lib is run, the symlinked file will be overwritten with the privileges of the target user or application using id3lib.

The RenderV2ToFile() function in 'tag_file.cpp' is affected.

Nikolaus Schulz reported this vulnerability.

Impact:   A local user may be able to obtain elevated privileges on the target system.
Solution:   Oracle has issued a fix for Solaris.

The Oracle advisory is available at:

http://blogs.oracle.com/sunsecurity/entry/cve_2007_4460_symlink_attack

Vendor URL:  id3lib.sourceforge.net/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  11.1

Message History:   This archive entry is a follow-up to the message listed below.
Sep 10 2007 id3lib Symlink Bug May Let Local Users Gain Elevated Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC