The internal_dump function in Mathopd before 1.5p5, and 1.6x before 1.6b6 BETA, when Mathopd is running with the -n option, allows local users to overwrite arbitrary files via a symlink attack on dump files that are triggered by a SIGWINCH signal.
References
Link | Resource |
---|---|
http://secunia.com/advisories/14524 | Third Party Advisory |
http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-05-01 21:00
Updated : 2021-06-01 07:09
NVD link : CVE-2005-0824
Mitre link : CVE-2005-0824
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
mathopd
- mathopd