Slackware Linux 3.4 – ‘liloconfig-color’ Temporary File

Slackware Linux 3.4 – ‘liloconfig-color’ Temporary File

漏洞ID 1053362 漏洞类型
发布时间 1998-04-06 更新时间 1998-04-06
图片[1]-Slackware Linux 3.4 – ‘liloconfig-color’ Temporary File-安全小百科CVE编号 N/A
图片[2]-Slackware Linux 3.4 – ‘liloconfig-color’ Temporary File-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19070
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/77/info

liloconfig-color creates the file /tmp/reply insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/reply to any file and wait for root to run the program. This will clober the target file.
The file created has permissions -rw-r--r--.

$ ln -s /tmp/reply /etc/passwd
< wait for root to run liloconfig-color >

相关推荐: Digital Unix dxchpwd文件任意修改漏洞

Digital Unix dxchpwd文件任意修改漏洞 漏洞ID 1207625 漏洞类型 未知 发布时间 1996-11-17 更新时间 1996-11-17 CVE编号 CVE-1999-1221 CNNVD-ID CNNVD-199611-005 漏洞…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享