Vulnerabilities > CVE-2005-4536 - Unspecified vulnerability in Debian Libmail-Audit-Perl 2.15
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN debian
nessus
Summary
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-960.NASL |
description | The former update caused temporary files to be created in the current working directory due to a wrong function argument. This update will create temporary files in the users home directory if HOME is set or in the common temporary directory otherwise, usually /tmp. For completeness below is a copy of the original advisory text : Niko Tyni discovered that the Mail::Audit module, a Perl library for creating simple mail filters, logs to a temporary file with a predictable filename in an insecure fashion when logging is turned on, which is not the case by default. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22826 |
published | 2006-10-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22826 |
title | Debian DSA-960-3 : libmail-audit-perl - insecure temporary file creation |
code |
|
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029
- http://secunia.com/advisories/18652
- http://secunia.com/advisories/18656
- http://www.debian.org/security/2006/dsa-960
- http://www.securityfocus.com/bid/16434
- http://www.vupen.com/english/advisories/2006/0378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24380
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24380
- http://www.vupen.com/english/advisories/2006/0378
- http://www.securityfocus.com/bid/16434
- http://www.debian.org/security/2006/dsa-960
- http://secunia.com/advisories/18656
- http://secunia.com/advisories/18652