The log4sh_readProperties function in log4sh 1.2.5 and earlier allows local users to overwrite arbitrary files via a symlink attack on predictable log4sh.$$ filenames.
archives.neohapsis.com/archives/vulnwatch/2005-q3/0001.html
bugs.gentoo.org/show_bug.cgi?id=94069
lists.grok.org.uk/pipermail/full-disclosure/2005-July/034873.html
secunia.com/advisories/15899
www.securityfocus.com/bid/14140
www.vupen.com/english/advisories/2005/0957
www.zataz.net/adviso/log4sh-06092005.txt