Unspecified tests in Lynis before 2.5.0 allow local users to write to arbitrary files or possibly gain privileges via a symlink attack on a temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lynis | Cisofy | * | 2.5.0 (excluding) |
Lynis | Ubuntu | esm-apps/xenial | * |
Lynis | Ubuntu | trusty | * |
Lynis | Ubuntu | upstream | * |
Lynis | Ubuntu | xenial | * |
Lynis | Ubuntu | yakkety | * |
Lynis | Ubuntu | zesty | * |