firehol in firehol 1.256 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/.firehol-tmp-#####-- and (2) /tmp/firehol.conf temporary files. NOTE: the vendor disputes this vulnerability, stating that an attack would require an attacker to create 1073741824*PID-RANGE symlinks.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firehol | Firehol | 1.256 (including) | 1.256 (including) |
Firehol | Ubuntu | dapper | * |
Firehol | Ubuntu | devel | * |
Firehol | Ubuntu | gutsy | * |
Firehol | Ubuntu | hardy | * |
Firehol | Ubuntu | intrepid | * |
Firehol | Ubuntu | jaunty | * |
Firehol | Ubuntu | karmic | * |
Firehol | Ubuntu | upstream | * |