CVE Vulnerabilities

CVE-2013-2561

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 23, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.3 MEDIUM
AV:L/AC:M/Au:N/C:N/I:C/A:C
RedHat/V2
4 MODERATE
AV:L/AC:H/Au:N/C:N/I:C/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on (1) ibdiagnet.db, (2) ibdiagnet.fdbs, (3) ibdiagnet_ibis.log, (4) ibdiagnet.log, (5) ibdiagnet.lst, (6) ibdiagnet.mcfdbs, (7) ibdiagnet.pkey, (8) ibdiagnet.psl, (9) ibdiagnet.slvl, or (10) ibdiagnet.sm in /tmp/.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linuxRedhat6.0 (including)6.0 (including)
Red Hat Enterprise Linux 6RedHatibutils-0:1.5.7-8.el6*
Red Hat Enterprise Linux 6RedHatinfinipath-psm-0:3.0.1-115.1015_open.2.el6*
Red Hat Enterprise Linux 6RedHatlibibverbs-0:1.1.7-1.el6*
Red Hat Enterprise Linux 6RedHatlibmlx4-0:1.0.5-4.el6.1*
Red Hat Enterprise Linux 6RedHatlibrdmacm-0:1.0.17-1.el6*
Red Hat Enterprise Linux 6RedHatmpitests-0:3.2-9.el6*
Red Hat Enterprise Linux 6RedHatmstflint-0:3.0-0.6.g6961daa.1.el6*
Red Hat Enterprise Linux 6RedHatopenmpi-0:1.5.4-2.el6*
Red Hat Enterprise Linux 6RedHatperftest-0:2.0-2.el6*
Red Hat Enterprise Linux 6RedHatqperf-0:0.4.9-1.el6*
Red Hat Enterprise Linux 6RedHatrdma-0:3.10-3.el6*
IbutilsUbuntuartful*
IbutilsUbuntucosmic*
IbutilsUbuntudevel*
IbutilsUbuntudisco*
IbutilsUbuntueoan*
IbutilsUbuntuesm-apps/focal*
IbutilsUbuntuesm-apps/jammy*
IbutilsUbuntuesm-apps/noble*
IbutilsUbuntufocal*
IbutilsUbuntugroovy*
IbutilsUbuntuhirsute*
IbutilsUbuntuimpish*
IbutilsUbuntujammy*
IbutilsUbuntukinetic*
IbutilsUbuntulunar*
IbutilsUbuntumantic*
IbutilsUbuntunoble*
IbutilsUbuntuoneiric*
IbutilsUbuntuoracular*
IbutilsUbuntuplucky*
IbutilsUbuntuprecise*
IbutilsUbuntuquantal*
IbutilsUbuntuquesting*
IbutilsUbunturaring*
IbutilsUbuntusaucy*
IbutilsUbuntutrusty*
IbutilsUbuntuupstream*
IbutilsUbuntuutopic*
IbutilsUbuntuvivid*
IbutilsUbuntuwily*
IbutilsUbuntuyakkety*
IbutilsUbuntuzesty*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References