Vulnerability Name: | CCN-59046 | ||||||
Published: | 2010-05-27 | ||||||
Updated: | 2010-05-27 | ||||||
Summary: | Ghostscript could allow a local attacker to launch a symlink attack. Temporary files are created insecurely without the O_EXCL mode. A local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges. | ||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
| ||||||
CVSS v2 Severity: | 3.3 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P) 2.8 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:TF/RC:UR)
| ||||||
Vulnerability Consequences: | File Manipulation | ||||||
References: | Source: CCN Type: Debian Bug report logs - #583316 /usr/bin/gv: Insecure gs workaround "gs -P-" Source: CCN Type: Ghostscript Web site Ghostscript Source: CCN Type: BID-40426 Ghostscript Insecure Temporary File Creation Vulnerability Source: XF Type: UNKNOWN ghostscript-tmp-symlink(59046) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |