Vulnerability Description
syncevo/installcheck-local.sh in syncevolution before 1.3.99.7 uses mktemp to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Syncevolution | <= 1.3.99.6 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736357Vendor Advisory
- http://www.openwall.com/lists/oss-security/2014/01/22/3
- http://www.openwall.com/lists/oss-security/2014/01/22/4
- http://www.osvdb.org/102380
- http://www.securityfocus.com/bid/65098
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90662
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736357Vendor Advisory
- http://www.openwall.com/lists/oss-security/2014/01/22/3
- http://www.openwall.com/lists/oss-security/2014/01/22/4
- http://www.osvdb.org/102380
- http://www.securityfocus.com/bid/65098
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90662
FAQ
What is CVE-2014-1639?
CVE-2014-1639 is a vulnerability with a CVSS score of 3.3 (LOW). syncevo/installcheck-local.sh in syncevolution before 1.3.99.7 uses mktemp to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows l...
How severe is CVE-2014-1639?
CVE-2014-1639 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1639?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Syncevolution.