Vulnerability Description
expn in the am-utils and net-fs packages for Gentoo, rPath Linux, and other distributions, allows local users to overwrite arbitrary files via a symlink attack on the expn[PID] temporary file. NOTE: this is the same issue as CVE-2003-0308.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gentoo | Linux | All versions |
| Rpath | Rpath Linux | All versions |
Related Weaknesses (CWE)
References
- http://bugs.gentoo.org/show_bug.cgi?id=210158Exploit
- http://secunia.com/advisories/29144Vendor Advisory
- http://secunia.com/advisories/29187Vendor Advisory
- http://secunia.com/advisories/29694Vendor Advisory
- http://secunia.com/advisories/33400Vendor Advisory
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0088
- http://www.gentoo.org/security/en/glsa/glsa-200804-09.xml
- http://www.securityfocus.com/archive/1/488931/100/0/threaded
- http://www.securityfocus.com/bid/28044
- https://issues.rpath.com/browse/RPL-2255
- https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00273.ht
- http://bugs.gentoo.org/show_bug.cgi?id=210158Exploit
- http://secunia.com/advisories/29144Vendor Advisory
- http://secunia.com/advisories/29187Vendor Advisory
- http://secunia.com/advisories/29694Vendor Advisory
FAQ
What is CVE-2008-1078?
CVE-2008-1078 is a vulnerability with a CVSS score of 7.2 (HIGH). expn in the am-utils and net-fs packages for Gentoo, rPath Linux, and other distributions, allows local users to overwrite arbitrary files via a symlink attack on the expn[PID] temporary file. NOTE: ...
How severe is CVE-2008-1078?
CVE-2008-1078 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1078?
Check the references section above for vendor advisories and patch information. Affected products include: Gentoo Linux, Rpath Rpath Linux.