Vulnerability Description
Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by wml_contrib/wmg.cgi and (2) temporary files used by wml_backend/p3_eperl/eperl_sys.c.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Website Meta Language | Website Meta Language | 2.0.11 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907Exploit
- http://secunia.com/advisories/28829
- http://secunia.com/advisories/28856Vendor Advisory
- http://secunia.com/advisories/29353
- http://security.gentoo.org/glsa/glsa-200803-23.xml
- http://www.debian.org/security/2008/dsa-1492
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:076
- http://www.securityfocus.com/bid/27685
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907Exploit
- http://secunia.com/advisories/28829
- http://secunia.com/advisories/28856Vendor Advisory
- http://secunia.com/advisories/29353
- http://security.gentoo.org/glsa/glsa-200803-23.xml
- http://www.debian.org/security/2008/dsa-1492
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:076
FAQ
What is CVE-2008-0666?
CVE-2008-0666 is a vulnerability with a CVSS score of 3.6 (LOW). Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by wml_contrib/wmg.cgi and (2) temporary files use...
How severe is CVE-2008-0666?
CVE-2008-0666 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0666?
Check the references section above for vendor advisories and patch information. Affected products include: Website Meta Language Website Meta Language.