Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-4108

Overview

Vulnerability Score 7.2 7.2
CVE Id CVE-2008-4108
Last Modified 07 Mar 2011 10:11:57
Published 18 Sep 2008 01:59:33
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2008-4108

Summary

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

Vulnerable Systems

Application

  • Python Software Foundation Python 2.4.5


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=462326

XF - python-movefaqwiz-symlink(45161)

VUPEN - ADV-2008-2659

SECTRACK - 1020904

BID - 31184

SREASON - 4274

MLIST - [oss-security] 20080916 Re: CVE Request (python)

MLIST - [oss-security] 20080915 CVE Request (python)

CONFIRM - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899


Last Updated: 27 May 2016 10:48:23