Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Python | Python_software_foundation | 2.4.5 (including) | 2.4.5 (including) |
Python2.4 | Ubuntu | dapper | * |
Python2.4 | Ubuntu | hardy | * |
Python2.4 | Ubuntu | upstream | * |
Python2.5 | Ubuntu | hardy | * |
Python2.5 | Ubuntu | upstream | * |
Python2.6 | Ubuntu | upstream | * |