CVE-2013-1444
Published: 25 September 2013
A certain Debian patch for txt2man 1.5.5, as used in txt2man 1.5.5-2, 1.5.5-4, and others, allows local users to overwrite arbitrary files via a symlink attack on /tmp/2222.
Notes
Author | Note |
---|---|
seth-arnold | "echo $post > /tmp/2222" -- looks like unsafe quoting, too. |
Priority
Status
Package | Release | Status |
---|---|---|
txt2man Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1.5.5-4ubuntu0.12.04.1)
|
|
quantal |
Released
(1.5.5-4ubuntu0.12.10.1)
|
|
raring |
Released
(1.5.5-4ubuntu0.13.04.1)
|
|
upstream |
Needed
|
|
This vulnerability is mitigated in part by the use of symlink restrictions in Ubuntu. This vulnerability is mitigated in part by the use of hardlink restrictions in Ubuntu. |