Vulnerability Description
The System.CodeDom.Compiler classes in Novell Mono create temporary files with insecure permissions, which allows local users to overwrite arbitrary files or execute arbitrary code via a symlink attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mono | Mono | 1.0 |
References
- http://fedoranews.org/cms/node/2401
- http://secunia.com/advisories/22237PatchVendor Advisory
- http://secunia.com/advisories/22277PatchVendor Advisory
- http://secunia.com/advisories/22614
- http://secunia.com/advisories/23154
- http://secunia.com/advisories/23213
- http://secunia.com/advisories/23776
- http://security.gentoo.org/glsa/glsa-200611-23.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:188
- http://www.novell.com/linux/security/advisories/2006_73_mono.html
- http://www.securityfocus.com/bid/20340
- http://www.ubuntu.com/usn/usn-357-1Patch
- http://www.vupen.com/english/advisories/2006/3911
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29353
- http://fedoranews.org/cms/node/2401
FAQ
What is CVE-2006-5072?
CVE-2006-5072 is a vulnerability with a CVSS score of 6.2 (MEDIUM). The System.CodeDom.Compiler classes in Novell Mono create temporary files with insecure permissions, which allows local users to overwrite arbitrary files or execute arbitrary code via a symlink attac...
How severe is CVE-2006-5072?
CVE-2006-5072 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5072?
Check the references section above for vendor advisories and patch information. Affected products include: Mono Mono.