Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing « redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Immunix | Immunix | 6.2 (including) | 6.2 (including) |
Linux | Conectiva | 4.0 (including) | 4.0 (including) |
Linux | Conectiva | 4.0es (including) | 4.0es (including) |
Linux | Conectiva | 4.1 (including) | 4.1 (including) |
Linux | Conectiva | 4.2 (including) | 4.2 (including) |
Linux | Conectiva | 5.0 (including) | 5.0 (including) |
Linux | Conectiva | 5.1 (including) | 5.1 (including) |
Red Hat Linux 5.2 | RedHat | * | |
Red Hat Linux 6.0 | RedHat | * | |
Red Hat Linux 6.1 | RedHat | * | |
Red Hat Linux 6.2 | RedHat | * | |
Red Hat Linux 7.0 | RedHat | * | |
Red Hat Linux 7.0j | RedHat | * |