CVE Vulnerabilities

CVE-2008-5312

Improper Link Resolution Before File Access ('Link Following')

Published: Dec 03, 2008 | Modified: Dec 28, 2010
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW

mailscanner 4.55.10 and other versions before 4.74.16-1 might allow local users to overwrite arbitrary files via a symlink attack on certain temporary files used by the (1) f-prot-autoupdate, (2) clamav-autoupdate, (3) panda-autoupdate.new, (4) trend-autoupdate.new, and (5) rav-autoupdate.new scripts in /etc/MailScanner/autoupdate/, a different vulnerability than CVE-2008-5140.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Mailscanner Mailscanner 4.55.10 (including) 4.55.10 (including)
Mailscanner Mailscanner 4.56.8-1 (including) 4.56.8-1 (including)
Mailscanner Mailscanner 4.57.7-1 (including) 4.57.7-1 (including)
Mailscanner Mailscanner 4.58.9-1 (including) 4.58.9-1 (including)
Mailscanner Mailscanner 4.59.4-2 (including) 4.59.4-2 (including)
Mailscanner Mailscanner 4.60.8-1 (including) 4.60.8-1 (including)
Mailscanner Mailscanner 4.61.7-2 (including) 4.61.7-2 (including)
Mailscanner Mailscanner 4.62.9-3 (including) 4.62.9-3 (including)
Mailscanner Mailscanner 4.63.8-1 (including) 4.63.8-1 (including)
Mailscanner Mailscanner 4.64.3-2 (including) 4.64.3-2 (including)
Mailscanner Mailscanner 4.65.3-1 (including) 4.65.3-1 (including)
Mailscanner Mailscanner 4.66.5-3 (including) 4.66.5-3 (including)
Mailscanner Mailscanner 4.67.6-1 (including) 4.67.6-1 (including)
Mailscanner Mailscanner 4.68.8 (including) 4.68.8 (including)
Mailscanner Mailscanner 4.68.8-1 (including) 4.68.8-1 (including)
Mailscanner Mailscanner 4.69.9-3 (including) 4.69.9-3 (including)
Mailscanner Mailscanner 4.70.7-1 (including) 4.70.7-1 (including)
Mailscanner Mailscanner 4.71.10-1 (including) 4.71.10-1 (including)
Mailscanner Mailscanner 4.72.5-1 (including) 4.72.5-1 (including)
Mailscanner Mailscanner 4.73.4-2 (including) 4.73.4-2 (including)
Mailscanner Ubuntu dapper *
Mailscanner Ubuntu gutsy *
Mailscanner Ubuntu hardy *
Mailscanner Ubuntu intrepid *
Mailscanner Ubuntu upstream *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References