Vulnerability Description
The populate_conns function in src/populate_conns.c in GSAMBAD 0.1.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gsambadtmp temporary file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 4.0 |
| Gsambad | Gsambad | 0.1.4 |
References
- http://osvdb.org/37795
- http://secunia.com/advisories/25909Vendor Advisory
- http://secunia.com/advisories/25914PatchVendor Advisory
- http://www.debian.org/security/2007/dsa-1327Patch
- http://www.securityfocus.com/bid/24717
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35401
- http://osvdb.org/37795
- http://secunia.com/advisories/25909Vendor Advisory
- http://secunia.com/advisories/25914PatchVendor Advisory
- http://www.debian.org/security/2007/dsa-1327Patch
- http://www.securityfocus.com/bid/24717
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35401
FAQ
What is CVE-2007-2838?
CVE-2007-2838 is a vulnerability with a CVSS score of 7.2 (HIGH). The populate_conns function in src/populate_conns.c in GSAMBAD 0.1.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gsambadtmp temporary file.
How severe is CVE-2007-2838?
CVE-2007-2838 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2838?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Gsambad Gsambad.