Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-08-18 04:00
Updated : 2017-10-11 01:29
NVD link : CVE-2004-0233
Mitre link : CVE-2004-0233
CVE.ORG link : CVE-2004-0233
JSON object : View
Products Affected
slackware
- slackware_linux
sgi
- propack
utempter
- utempter
CWE