CVE Vulnerabilities

CVE-2008-5312

Improper Link Resolution Before File Access ('Link Following')

Published: Dec 03, 2008 | Modified: Dec 28, 2010
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

mailscanner 4.55.10 and other versions before 4.74.16-1 might allow local users to overwrite arbitrary files via a symlink attack on certain temporary files used by the (1) f-prot-autoupdate, (2) clamav-autoupdate, (3) panda-autoupdate.new, (4) trend-autoupdate.new, and (5) rav-autoupdate.new scripts in /etc/MailScanner/autoupdate/, a different vulnerability than CVE-2008-5140.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Mailscanner Mailscanner 4.73.4-2 4.73.4-2
Mailscanner Mailscanner 4.67.6-1 4.67.6-1
Mailscanner Mailscanner 4.59.4-2 4.59.4-2
Mailscanner Mailscanner 4.58.9-1 4.58.9-1
Mailscanner Mailscanner 4.64.3-2 4.64.3-2
Mailscanner Mailscanner 4.70.7-1 4.70.7-1
Mailscanner Mailscanner 4.68.8-1 4.68.8-1
Mailscanner Mailscanner 4.61.7-2 4.61.7-2
Mailscanner Mailscanner 4.72.5-1 4.72.5-1
Mailscanner Mailscanner 4.68.8 4.68.8
Mailscanner Mailscanner 4.56.8-1 4.56.8-1
Mailscanner Mailscanner 4.62.9-3 4.62.9-3
Mailscanner Mailscanner 4.66.5-3 4.66.5-3
Mailscanner Mailscanner 4.69.9-3 4.69.9-3
Mailscanner Mailscanner 4.60.8-1 4.60.8-1
Mailscanner Mailscanner 4.57.7-1 4.57.7-1
Mailscanner Mailscanner 4.63.8-1 4.63.8-1
Mailscanner Mailscanner 4.55.10 4.55.10
Mailscanner Mailscanner 4.65.3-1 4.65.3-1
Mailscanner Mailscanner 4.71.10-1 4.71.10-1

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References