CVE Vulnerabilities

CVE-2008-5150

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 18, 2008 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
NEGLIGIBLE

sample.sh in maildirsync 1.1 allows local users to append data to arbitrary files via a symlink attack on a /tmp/maildirsync-*.#####.log temporary file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Maildirsync Jose_carlos_medeiros 1.1 (including) 1.1 (including)
Maildirsync Ubuntu artful *
Maildirsync Ubuntu bionic *
Maildirsync Ubuntu cosmic *
Maildirsync Ubuntu dapper *
Maildirsync Ubuntu devel *
Maildirsync Ubuntu disco *
Maildirsync Ubuntu eoan *
Maildirsync Ubuntu esm-apps/bionic *
Maildirsync Ubuntu esm-apps/focal *
Maildirsync Ubuntu esm-apps/jammy *
Maildirsync Ubuntu esm-apps/noble *
Maildirsync Ubuntu esm-apps/xenial *
Maildirsync Ubuntu focal *
Maildirsync Ubuntu groovy *
Maildirsync Ubuntu gutsy *
Maildirsync Ubuntu hardy *
Maildirsync Ubuntu hirsute *
Maildirsync Ubuntu impish *
Maildirsync Ubuntu intrepid *
Maildirsync Ubuntu jammy *
Maildirsync Ubuntu jaunty *
Maildirsync Ubuntu karmic *
Maildirsync Ubuntu kinetic *
Maildirsync Ubuntu lucid *
Maildirsync Ubuntu lunar *
Maildirsync Ubuntu mantic *
Maildirsync Ubuntu maverick *
Maildirsync Ubuntu natty *
Maildirsync Ubuntu noble *
Maildirsync Ubuntu oneiric *
Maildirsync Ubuntu oracular *
Maildirsync Ubuntu precise *
Maildirsync Ubuntu quantal *
Maildirsync Ubuntu raring *
Maildirsync Ubuntu saucy *
Maildirsync Ubuntu trusty *
Maildirsync Ubuntu utopic *
Maildirsync Ubuntu vivid *
Maildirsync Ubuntu wily *
Maildirsync Ubuntu xenial *
Maildirsync Ubuntu yakkety *
Maildirsync Ubuntu zesty *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References