The (1) mkxmltype and (2) mkdtskel scripts in XML-DT before 0.64 allow local users to overwrite arbitrary files via a symlink attack on a /tmp/xml##### temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xml-dt | Xml-dt_project | * | 0.63 (including) |
Xml-dt | Xml-dt_project | 0.60 (including) | 0.60 (including) |
Xml-dt | Xml-dt_project | 0.61 (including) | 0.61 (including) |
Xml-dt | Xml-dt_project | 0.62 (including) | 0.62 (including) |
Libxml-dt-perl | Ubuntu | artful | * |
Libxml-dt-perl | Ubuntu | lucid | * |
Libxml-dt-perl | Ubuntu | precise | * |
Libxml-dt-perl | Ubuntu | trusty | * |
Libxml-dt-perl | Ubuntu | upstream | * |
Libxml-dt-perl | Ubuntu | utopic | * |
Libxml-dt-perl | Ubuntu | vivid | * |
Libxml-dt-perl | Ubuntu | wily | * |
Libxml-dt-perl | Ubuntu | yakkety | * |
Libxml-dt-perl | Ubuntu | zesty | * |