Vulnerability Description
buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite arbitrary files via a symlink attack on the (1) scan.pnm and (2) scan.jpg temporary files.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Fedora Core | f7 |
Related Weaknesses (CWE)
References
- http://osvdb.org/42422
- http://secunia.com/advisories/27847
- http://securitytracker.com/id?1019007
- http://www.securityfocus.com/bid/26617
- http://www.vupen.com/english/advisories/2007/4024
- https://bugzilla.redhat.com/show_bug.cgi?id=383131Exploit
- http://osvdb.org/42422
- http://secunia.com/advisories/27847
- http://securitytracker.com/id?1019007
- http://www.securityfocus.com/bid/26617
- http://www.vupen.com/english/advisories/2007/4024
- https://bugzilla.redhat.com/show_bug.cgi?id=383131Exploit
FAQ
What is CVE-2007-6131?
CVE-2007-6131 is a vulnerability with a CVSS score of 2.1 (LOW). buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite arbitrary files via a symlink attack on the (1) scan.pnm and (2) scan.jpg temporary files.
How severe is CVE-2007-6131?
CVE-2007-6131 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6131?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Fedora Core.