CVE Vulnerabilities

CVE-2008-5313

Improper Link Resolution Before File Access ('Link Following')

Published: Dec 03, 2008 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

mailscanner 4.68.8 and other versions before 4.74.16-1 might allow local users to overwrite arbitrary files via a symlink attack on certain temporary files used by the (1) f-prot-autoupdate, (2) clamav-autoupdate, (3) avast-autoupdate, and (4) f-prot-6-autoupdate scripts in /etc/MailScanner/autoupdate/; the (5) bitdefender-wrapper, (6) kaspersky-wrapper, (7) clamav-wrapper, and (8) rav-wrapper scripts in /etc/MailScanner/wrapper/; the (9) Quarantine.pm, (10) TNEF.pm, (11) MessageBatch.pm, (12) WorkArea.pm, and (13) SA.pm scripts in /usr/share/MailScanner/MailScanner/; (14) /usr/sbin/MailScanner; and (15) scripts that load the /etc/MailScanner/mailscanner.conf.with.mcp configuration file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
MailscannerMailscanner4.68.8 (including)4.68.8 (including)
MailscannerMailscanner4.68.8-1 (including)4.68.8-1 (including)
MailscannerMailscanner4.69.9-3 (including)4.69.9-3 (including)
MailscannerMailscanner4.70.7-1 (including)4.70.7-1 (including)
MailscannerMailscanner4.71.10-1 (including)4.71.10-1 (including)
MailscannerMailscanner4.72.5-1 (including)4.72.5-1 (including)
MailscannerMailscanner4.73.4-2 (including)4.73.4-2 (including)
MailscannerUbuntudapper*
MailscannerUbuntugutsy*
MailscannerUbuntuhardy*
MailscannerUbuntuintrepid*
MailscannerUbuntuupstream*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References