ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_enterprise_server | Suse | 11-sp3 (including) | 11-sp3 (including) |
Red Hat Enterprise Linux 6 | RedHat | ppc64-diag-0:2.6.7-4.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | ppc64-diag-0:2.6.7-6.el7 | * |
Ppc64-diag | Ubuntu | utopic | * |
Ppc64-diag | Ubuntu | vivid | * |
Ppc64-diag | Ubuntu | wily | * |