CVE Vulnerabilities

CVE-2008-5144

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 18, 2008 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

nvidia-cg-toolkit-installer in nvidia-cg-toolkit 2.0.0015 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvidia-cg-toolkit-manifest temporary file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Nvidia-cg-toolkitFederico_di_gregorio2.0.0015 (including)2.0.0015 (including)
Nvidia-cg-toolkitUbuntuartful*
Nvidia-cg-toolkitUbuntubionic*
Nvidia-cg-toolkitUbuntucosmic*
Nvidia-cg-toolkitUbuntudevel*
Nvidia-cg-toolkitUbuntudisco*
Nvidia-cg-toolkitUbuntueoan*
Nvidia-cg-toolkitUbuntuesm-apps/bionic*
Nvidia-cg-toolkitUbuntuesm-apps/focal*
Nvidia-cg-toolkitUbuntuesm-apps/jammy*
Nvidia-cg-toolkitUbuntuesm-apps/noble*
Nvidia-cg-toolkitUbuntuesm-apps/xenial*
Nvidia-cg-toolkitUbuntufocal*
Nvidia-cg-toolkitUbuntugroovy*
Nvidia-cg-toolkitUbuntugutsy*
Nvidia-cg-toolkitUbuntuhardy*
Nvidia-cg-toolkitUbuntuhirsute*
Nvidia-cg-toolkitUbuntuimpish*
Nvidia-cg-toolkitUbuntuintrepid*
Nvidia-cg-toolkitUbuntujammy*
Nvidia-cg-toolkitUbuntujaunty*
Nvidia-cg-toolkitUbuntukarmic*
Nvidia-cg-toolkitUbuntukinetic*
Nvidia-cg-toolkitUbuntulucid*
Nvidia-cg-toolkitUbuntulunar*
Nvidia-cg-toolkitUbuntumantic*
Nvidia-cg-toolkitUbuntumaverick*
Nvidia-cg-toolkitUbuntunatty*
Nvidia-cg-toolkitUbuntunoble*
Nvidia-cg-toolkitUbuntuoneiric*
Nvidia-cg-toolkitUbuntuoracular*
Nvidia-cg-toolkitUbuntuplucky*
Nvidia-cg-toolkitUbuntuprecise*
Nvidia-cg-toolkitUbuntuquantal*
Nvidia-cg-toolkitUbuntuquesting*
Nvidia-cg-toolkitUbunturaring*
Nvidia-cg-toolkitUbuntusaucy*
Nvidia-cg-toolkitUbuntutrusty*
Nvidia-cg-toolkitUbuntuutopic*
Nvidia-cg-toolkitUbuntuvivid*
Nvidia-cg-toolkitUbuntuwily*
Nvidia-cg-toolkitUbuntuxenial*
Nvidia-cg-toolkitUbuntuyakkety*
Nvidia-cg-toolkitUbuntuzesty*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References