CVE Vulnerabilities

CVE-2008-5152

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 18, 2008 | Modified: Aug 08, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
NEGLIGIBLE

inmail-show in mh-book 200605 allows local users to overwrite arbitrary files via a symlink attack on a (1) /tmp/inmail#####.log or (2) /tmp/inmail#####.stdin temporary file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Mh-book Peter_s_galbraith 2000605 (including) 2000605 (including)
Mh-book Ubuntu artful *
Mh-book Ubuntu bionic *
Mh-book Ubuntu cosmic *
Mh-book Ubuntu dapper *
Mh-book Ubuntu devel *
Mh-book Ubuntu disco *
Mh-book Ubuntu eoan *
Mh-book Ubuntu esm-apps/bionic *
Mh-book Ubuntu esm-apps/focal *
Mh-book Ubuntu esm-apps/jammy *
Mh-book Ubuntu esm-apps/noble *
Mh-book Ubuntu esm-apps/xenial *
Mh-book Ubuntu focal *
Mh-book Ubuntu groovy *
Mh-book Ubuntu gutsy *
Mh-book Ubuntu hardy *
Mh-book Ubuntu hirsute *
Mh-book Ubuntu impish *
Mh-book Ubuntu intrepid *
Mh-book Ubuntu jammy *
Mh-book Ubuntu jaunty *
Mh-book Ubuntu karmic *
Mh-book Ubuntu kinetic *
Mh-book Ubuntu lucid *
Mh-book Ubuntu lunar *
Mh-book Ubuntu mantic *
Mh-book Ubuntu maverick *
Mh-book Ubuntu natty *
Mh-book Ubuntu noble *
Mh-book Ubuntu oneiric *
Mh-book Ubuntu oracular *
Mh-book Ubuntu precise *
Mh-book Ubuntu quantal *
Mh-book Ubuntu raring *
Mh-book Ubuntu saucy *
Mh-book Ubuntu trusty *
Mh-book Ubuntu utopic *
Mh-book Ubuntu vivid *
Mh-book Ubuntu wily *
Mh-book Ubuntu xenial *
Mh-book Ubuntu yakkety *
Mh-book Ubuntu zesty *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References