Vulnerability Description
dispatch-conf in Portage 2.0.51-r2 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
CVSS Score
2.1
LOW
AV:L/AC:L/Au:N/C:N/I:P/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gentoo | Linux | All versions |
References
- http://bugs.gentoo.org/show_bug.cgi?id=69147
- http://secunia.com/advisories/13108/
- http://www.gentoo.org/security/en/glsa/glsa-200411-13.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/11616PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17986
- http://bugs.gentoo.org/show_bug.cgi?id=69147
- http://secunia.com/advisories/13108/
- http://www.gentoo.org/security/en/glsa/glsa-200411-13.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/11616PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17986
FAQ
What is CVE-2004-1107?
CVE-2004-1107 is a vulnerability with a CVSS score of 2.1 (LOW). dispatch-conf in Portage 2.0.51-r2 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
How severe is CVE-2004-1107?
CVE-2004-1107 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1107?
Check the references section above for vendor advisories and patch information. Affected products include: Gentoo Linux.