Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0824 Link Following vulnerability in Mathopd
The internal_dump function in Mathopd before 1.5p5, and 1.6x before 1.6b6 BETA, when Mathopd is running with the -n option, allows local users to overwrite arbitrary files via a symlink attack on dump files that are triggered by a SIGWINCH signal.
local
low complexity
mathopd CWE-59
5.5
2005-03-25 CVE-2005-0587 Link Following vulnerability in Mozilla
Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file.
network
low complexity
mozilla CWE-59
6.5
2004-12-31 CVE-2004-1901 Link Following vulnerability in Gentoo Linux and Portage
Portage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.
local
low complexity
gentoo CWE-59
5.5
2004-10-18 CVE-2004-1603 Link Following vulnerability in Cpanel 9.4.1
cPanel 9.4.1-RELEASE-64 follows hard links, which allows local users to (1) read arbitrary files via the backup feature or (2) chown arbitrary files via the .htaccess file when Front Page extensions are enabled or disabled.
local
low complexity
cpanel CWE-59
5.5
2004-09-28 CVE-2004-0689 Link Following vulnerability in multiple products
KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.
local
low complexity
kde debian CWE-59
7.1
2004-04-15 CVE-2004-0217 Link Following vulnerability in Symantec Antivirus Scan Engine 4.0/4.3
The LiveUpdate capability (liveupdate.sh) in Symantec AntiVirus Scan Engine 4.0 and 4.3 for Red Hat Linux allows local users to create or append to arbitrary files via a symlink attack on /tmp/LiveUpdate.log.
local
high complexity
symantec CWE-59
7.0
2003-12-31 CVE-2003-1233 Link Following vulnerability in Pedestalsoftware Integrity Protection Driver 1.3
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
network
low complexity
pedestalsoftware CWE-59
critical
9.8
2003-11-17 CVE-2003-0844 Link Following vulnerability in Schroepl MOD Gzip
mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.
local
low complexity
schroepl CWE-59
7.1
2003-08-18 CVE-2003-0578 Link Following vulnerability in IBM U2 Universe 10.0.0.9
cci_dir in IBM U2 UniVerse 10.0.0.9 and earlier creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files.
local
low complexity
ibm CWE-59
7.8
2003-08-18 CVE-2003-0517 Link Following vulnerability in Mgetty Project Mgetty 1.1.28
faxrunqd.in in mgetty 1.1.28 and earlier allows local users to overwrite files via a symlink attack on JOB files.
local
low complexity
mgetty-project CWE-59
5.5