ID |
CVE-2004-1808
|
Summary |
Extcompose in metamail does not verify the output file before writing to it, which allows local users to overwrite arbitrary files via a symlink attack. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 2.1 (as of 11-07-2017 - 01:31) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bid | 9850 | bugtraq | 20040312 Metamail 'extcompose' script Symlink Vulnerability | xf | metamail-extcompose-symlink(15460) |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2009-06-01 | organization | Red Hat | statement | The Red Hat Security Response Team rated this issue as having low security impact. This issue affected Red Hat Enterprise Linux 2.1 but due to the low severity will not be fixed. metamail was not shipped in Red Hat Enterprise Linux 3, 4, or 5. |
|
Last major update |
11-07-2017 - 01:31 |
Published |
31-12-2004 - 05:00 |
Last modified |
11-07-2017 - 01:31 |