Vulnerability Name:

CVE-2000-1162 (CCN-5563)

Assigned:2000-11-22
Published:2000-11-22
Updated:2017-10-10
Summary:ghostscript before 5.10-16 allows local users to overwrite files of other users via a symlink attack.
CVSS v3 Severity:4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.7 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2000-041.0
Two security problems with ghostscript

Source: MITRE
Type: CNA
CVE-2000-1162

Source: CONECTIVA
Type: UNKNOWN
CLSA-2000:343

Source: CCN
Type: SuSE Security Announcement, November 15 2000
SuSE: miscellaneous

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:343
ghostscript: Temporary files and dynamic libraries

Source: CCN
Type: RHSA-2000-114
ghostscript uses mktemp instead of mkstemp

Source: CALDERA
Type: Patch, Vendor Advisory
CSSA-2000-041

Source: DEBIAN
Type: UNKNOWN
20001123 ghostscript: symlink attack

Source: DEBIAN
Type: Debian Security Advisory 20001123
ghostscript: symlink attack

Source: CCN
Type: US-CERT VU#227312
Aladdin Ghostscript creates insecure temporary files allowing a local user to create symbolic links to other files

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2000:074

Source: CCN
Type: Immunix OS Security Advisory IMNX-2000-70-010-01
ghostscript

Source: CCN
Type: OSVDB ID: 1661
Aladdin Ghostscript Symlink Arbitrary File Overwrite

Source: REDHAT
Type: UNKNOWN
RHSA-2000:114

Source: BID
Type: Patch, Vendor Advisory
1990

Source: CCN
Type: BID-1990
Aladdin Ghostscript Symlink Vulnerability

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:074
ghostscript

Source: XF
Type: UNKNOWN
ghostscript-sym-link(5563)

Source: XF
Type: UNKNOWN
ghostscript-sym-link(5563)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:aladdin_enterprises:ghostscript:4.3:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.10.10:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.10.15:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.50:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:artifex:ghostscript:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    aladdin_enterprises ghostscript 4.3
    aladdin_enterprises ghostscript 5.10.10
    aladdin_enterprises ghostscript 5.10.15
    aladdin_enterprises ghostscript 5.50
    artifex ghostscript *
    redhat linux 6.2
    redhat linux 7
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3