Vulnerabilities > CVE-2007-2838 - Unspecified vulnerability in Gsambad 0.1.4
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gsambad
nessus
Summary
The populate_conns function in src/populate_conns.c in GSAMBAD 0.1.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gsambadtmp temporary file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 13 | |
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-1327.NASL |
description | Steve Kemp from the Debian Security Audit project discovered that gsambad, a GTK+ configuration tool for samba, uses temporary files in an unsafe manner which may be exploited to truncate arbitrary files from the local system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25639 |
published | 2007-07-02 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25639 |
title | Debian DSA-1327-1 : gsambad - insecure temporary files |
code |
|
References
- http://osvdb.org/37795
- http://osvdb.org/37795
- http://secunia.com/advisories/25909
- http://secunia.com/advisories/25909
- http://secunia.com/advisories/25914
- http://secunia.com/advisories/25914
- http://www.debian.org/security/2007/dsa-1327
- http://www.debian.org/security/2007/dsa-1327
- http://www.securityfocus.com/bid/24717
- http://www.securityfocus.com/bid/24717
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35401
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35401