1.2 Low
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:H/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
27.4%
diffutils, a set of utilities distributed with many versions of linux, contains a utility called sdiff, which creates temporary files of predictable names in an insecure fashion. Using a symbolic link attack, an intruder can cause overwrite of any file writable by the user executing sdiff.
sdiff creates temporary files as part of the file comparison process. Under some conditions, sdiff will create files in /tmp with predictable names, and furthermore does not check for prior existence or ownership of these files.
By creating a series of symbolic links, an intruder can cause sdiff to overwrite any file writable by the user executing sdiff, which may corrupt data or deny service.
Apply vendor patches; see the Systems Affected section below.
579928
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 18, 2001 Updated: September 19, 2001
Affected
For our Linux products:
Vulnerable: Openlinux 2.3, OpenLinux eServer 2.3.1, eDesktop 2.4
We have not released a security update for this problem, but released fixes in our 3.1 products.
Not vulnerable: OpenLinux Workstation 3.1 OpenLinux Server 3.1
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: January 10, 2001 Updated: September 17, 2001
Affected
<http://www.linuxsecurity.com/advisories/other_advisory-1034.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: January 10, 2001 Updated: September 17, 2001
Affected
<http://www.linux-mandrake.com/en/updates/2001/MDKSA-2001-008.php3?dis=6.1>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: September 18, 2001 Updated: November 08, 2001
Affected
<http://www.redhat.com/support/errata/RHSA-2001-116.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: January 10, 2001 Updated: September 18, 2001
Affected
<http://www.linuxsecurity.com/advisories/other_advisory-1047.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: September 18, 2001 Updated: October 09, 2001
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Notified: September 18, 2001 Updated: October 09, 2001
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23579928 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was first described by Greg Kroah-Hartman of Immunix.
This document was last modified by Tim Shimeall.
CVE IDs: | CVE-2001-0117 |
---|---|
Severity Metric: | 4.50 Date Public: |