Description
** DISPUTED ** init in initramfs-tools 0.92f allows local users to overwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug temporary file. NOTE: the vendor disputes this vulnerability, stating that "init is [used in] a single-user context; there's no possibility that this is exploitable."
Affected Software
Related
{"id": "CVE-2008-4996", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2008-4996", "description": "** DISPUTED ** init in initramfs-tools 0.92f allows local users to overwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug temporary file. NOTE: the vendor disputes this vulnerability, stating that \"init is [used in] a single-user context; there's no possibility that this is exploitable.\"", "published": "2008-11-07T19:36:00", "modified": "2008-11-10T05:00:00", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 6.9}, "severity": "MEDIUM", "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4996", "reporter": "cve@mitre.org", "references": ["http://bugs.debian.org/496386", "http://www.openwall.com/lists/oss-security/2008/10/30/2", "https://bugs.gentoo.org/show_bug.cgi?id=235770", "http://dev.gentoo.org/~rbu/security/debiantemp/initramfs-tools"], "cvelist": ["CVE-2008-4996"], "immutableFields": [], "lastseen": "2022-03-23T13:14:20", "viewCount": 14, "enchantments": {"dependencies": {"references": [{"type": "debiancve", "idList": ["DEBIANCVE:CVE-2008-4996"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2008-4996"]}], "rev": 4}, "score": {"value": 5.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "debiancve", "idList": ["DEBIANCVE:CVE-2008-4996"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2008-4996"]}]}, "exploitation": null, "vulnersScore": 5.1}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:debian:initramfs-tools:0.92f"], "cpe23": ["cpe:2.3:a:debian:initramfs-tools:0.92f:*:*:*:*:*:*:*"], "cwe": ["CWE-59"], "affectedSoftware": [{"cpeName": "debian:initramfs-tools", "version": "0.92f", "operator": "eq", "name": "debian initramfs-tools"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:debian:initramfs-tools:0.92f:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "http://bugs.debian.org/496386", "name": "http://bugs.debian.org/496386", "refsource": "MISC", "tags": []}, {"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2", "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "refsource": "MLIST", "tags": []}, {"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770", "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770", "refsource": "MISC", "tags": []}, {"url": "http://dev.gentoo.org/~rbu/security/debiantemp/initramfs-tools", "name": "http://dev.gentoo.org/~rbu/security/debiantemp/initramfs-tools", "refsource": "MISC", "tags": ["Exploit"]}]}
{"debiancve": [{"lastseen": "2022-04-16T07:33:52", "description": "** DISPUTED ** init in initramfs-tools 0.92f allows local users to overwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug temporary file. NOTE: the vendor disputes this vulnerability, stating that \"init is [used in] a single-user context; there's no possibility that this is exploitable.\"", "cvss3": {}, "published": "2008-11-07T19:36:00", "type": "debiancve", "title": "CVE-2008-4996", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-4996"], "modified": "2008-11-07T19:36:00", "id": "DEBIANCVE:CVE-2008-4996", "href": "https://security-tracker.debian.org/tracker/CVE-2008-4996", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntucve": [{"lastseen": "2021-07-31T02:09:21", "description": "** DISPUTED ** init in initramfs-tools 0.92f allows local users to\noverwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug\ntemporary file. NOTE: the vendor disputes this vulnerability, stating that\n\"init is [used in] a single-user context; there's no possibility that this\nis exploitable.\"\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | per upstream, occurs in init, which is a single-user context \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | not exploitable, let's ignore\n", "cvss3": {}, "published": "2008-11-07T00:00:00", "type": "ubuntucve", "title": "CVE-2008-4996", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-4996"], "modified": "2008-11-07T00:00:00", "id": "UB:CVE-2008-4996", "href": "https://ubuntu.com/security/CVE-2008-4996", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}]}