Vulnerability Details : CVE-2008-5007
create_lazarus_export_tgz.sh in lazarus 0.9.24 allows local users to overwrite or delete arbitrary files via a symlink attack on a (1) /tmp/lazarus.tgz temporary file or a (2) /tmp/lazarus temporary directory.
Products affected by CVE-2008-5007
- cpe:2.3:a:lazarus:lazarus:0.9.24:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-5007
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-5007
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2008-5007
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5007
-
http://dev.gentoo.org/~rbu/security/debiantemp/lazarus-src
404 Not FoundExploit
-
https://bugs.gentoo.org/show_bug.cgi?id=235828
235828 – (CVE-2008-5007) dev-lang/lazarus-0.99.24 insecure temp file usage (CVE-2008-5007)
-
http://www.securityfocus.com/bid/30917
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44824
lazarus-src create_lazarus_export_tgz.sh symlink CVE-2008-5007 Vulnerability Report
-
http://www.openwall.com/lists/oss-security/2008/10/30/2
oss-security - CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire
-
http://code.google.com/p/bollin/source/browse/lazarus/trunk/debian/patches/07_sh_using_tmp.dpatch?spec=svn3462&r=3462
Google Code Archive - Long-term storage for Google Code Project Hosting.
-
http://bugs.debian.org/496377
#496377 - The possibility of attack with the help of symlinks in some Debian packages - Debian Bug report logs
-
http://uvw.ru/report.lenny.txt
Jump to