CVE-2008-4108

medium

Description

Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/45161

https://bugzilla.redhat.com/show_bug.cgi?id=462326

http://www.vupen.com/english/advisories/2008/2659

http://www.securitytracker.com/id?1020904

http://www.securityfocus.com/bid/31184

http://securityreason.com/securityalert/4274

http://marc.info/?l=oss-security&m=122152861617434&w=2

http://marc.info/?l=oss-security&m=122148330903513&w=2

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899

Details

Source: Mitre, NVD

Published: 2008-09-18

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Severity: Medium