Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-08-17 21:00
Updated : 2017-10-10 18:29
NVD link : CVE-2004-0233
Mitre link : CVE-2004-0233
JSON object : View
CWE
Products Affected
sgi
- propack
utempter
- utempter
slackware
- slackware_linux