CVE Vulnerabilities

CVE-2008-5313

Improper Link Resolution Before File Access ('Link Following')

Published: Dec 03, 2008 | Modified: Dec 28, 2010
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

mailscanner 4.68.8 and other versions before 4.74.16-1 might allow local users to overwrite arbitrary files via a symlink attack on certain temporary files used by the (1) f-prot-autoupdate, (2) clamav-autoupdate, (3) avast-autoupdate, and (4) f-prot-6-autoupdate scripts in /etc/MailScanner/autoupdate/; the (5) bitdefender-wrapper, (6) kaspersky-wrapper, (7) clamav-wrapper, and (8) rav-wrapper scripts in /etc/MailScanner/wrapper/; the (9) Quarantine.pm, (10) TNEF.pm, (11) MessageBatch.pm, (12) WorkArea.pm, and (13) SA.pm scripts in /usr/share/MailScanner/MailScanner/; (14) /usr/sbin/MailScanner; and (15) scripts that load the /etc/MailScanner/mailscanner.conf.with.mcp configuration file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Mailscanner Mailscanner 4.73.4-2 4.73.4-2
Mailscanner Mailscanner 4.70.7-1 4.70.7-1
Mailscanner Mailscanner 4.68.8-1 4.68.8-1
Mailscanner Mailscanner 4.72.5-1 4.72.5-1
Mailscanner Mailscanner 4.68.8 4.68.8
Mailscanner Mailscanner 4.69.9-3 4.69.9-3
Mailscanner Mailscanner 4.71.10-1 4.71.10-1

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References