The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Opensuse | Opensuse | 13.1 (including) | 13.1 (including) |
Llvm-toolchain-3.2 | Ubuntu | saucy | * |
Llvm-toolchain-3.2 | Ubuntu | upstream | * |
Llvm-toolchain-3.3 | Ubuntu | precise | * |
Llvm-toolchain-3.3 | Ubuntu | saucy | * |
Llvm-toolchain-3.3 | Ubuntu | trusty | * |
Llvm-toolchain-3.3 | Ubuntu | upstream | * |
Llvm-toolchain-3.3 | Ubuntu | utopic | * |
Llvm-toolchain-3.4 | Ubuntu | precise | * |
Llvm-toolchain-3.4 | Ubuntu | trusty | * |
Llvm-toolchain-3.4 | Ubuntu | upstream | * |
Llvm-toolchain-3.4 | Ubuntu | utopic | * |
Llvm-toolchain-3.5 | Ubuntu | upstream | * |
Llvm-toolchain-3.5 | Ubuntu | utopic | * |
Llvm-toolchain-3.6 | Ubuntu | upstream | * |
Llvm-toolchain-3.6 | Ubuntu | utopic | * |
Llvm-toolchain-snapshot | Ubuntu | saucy | * |
Llvm-toolchain-snapshot | Ubuntu | trusty | * |
Llvm-toolchain-snapshot | Ubuntu | upstream | * |