SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   id3lib Vendors:   id3lib.sourceforge.net
id3lib Symlink Bug May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1018667
SecurityTracker URL:  http://securitytracker.com/id/1018667
CVE Reference:   CVE-2007-4460   (Links to External Site)
Date:  Sep 10 2007
Impact:   Modification of user information, User access via local system

Version(s): 3.8.3
Description:   A vulnerability was reported in id3lib. A local user may be able to obtain elevated privileges on the target system.

The software creates a temporary file in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to a temporary file to be used by id3lib. When id3lib is run, the symlinked file will be overwritten with the privileges of the target user or application using id3lib.

The RenderV2ToFile() function in 'tag_file.cpp' is affected.

Nikolaus Schulz reported this vulnerability.

Impact:   A local user may be able to obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  id3lib.sourceforge.net/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 26 2013 (Oracle Issues Fix for Solaris) id3lib Symlink Bug May Let Local Users Gain Elevated Privileges
Oracle has issued a fix for Solaris 11.1.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC