pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pyro | Pyro_project | * | 3.15 (excluding) |
Pyro | Ubuntu | hardy | * |
Pyro | Ubuntu | lucid | * |
Pyro | Ubuntu | maverick | * |
Pyro | Ubuntu | natty | * |
Pyro | Ubuntu | oneiric | * |
Pyro | Ubuntu | upstream | * |