freevo.real in freevo 1.8.1 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/-#####.pid, (2) /tmp/freevo-gdb, (3) /tmp/freevo-gdb.sh, and (4) /tmp/.stats temporary files. NOTE: this issue is only a vulnerability when a verbose debug mode is activated by modifying source code.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freevo | Duncan_webb | 1.8.1 (including) | 1.8.1 (including) |
Freevo | Ubuntu | devel | * |
Freevo | Ubuntu | intrepid | * |
Freevo | Ubuntu | jaunty | * |
Freevo | Ubuntu | karmic | * |
Freevo | Ubuntu | upstream | * |