Vulnerability Description
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Libmail-Audit-Perl | 2.1-5 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029
- http://secunia.com/advisories/18652Vendor Advisory
- http://secunia.com/advisories/18656Vendor Advisory
- http://www.debian.org/security/2006/dsa-960Vendor Advisory
- http://www.securityfocus.com/bid/16434
- http://www.vupen.com/english/advisories/2006/0378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24380
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029
- http://secunia.com/advisories/18652Vendor Advisory
- http://secunia.com/advisories/18656Vendor Advisory
- http://www.debian.org/security/2006/dsa-960Vendor Advisory
- http://www.securityfocus.com/bid/16434
- http://www.vupen.com/english/advisories/2006/0378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24380
FAQ
What is CVE-2005-4536?
CVE-2005-4536 is a vulnerability with a CVSS score of 2.1 (LOW). Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via ...
How severe is CVE-2005-4536?
CVE-2005-4536 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4536?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Libmail-Audit-Perl.