- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 19070
- Проверка EDB
-
- Пройдено
- Автор
- NEONHAZE
- Тип уязвимости
- LOCAL
- Платформа
- LINUX
- CVE
- null
- Дата публикации
- 1998-04-06
Код:
source: https://www.securityfocus.com/bid/77/info
liloconfig-color creates the file /tmp/reply insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/reply to any file and wait for root to run the program. This will clober the target file.
The file created has permissions -rw-r--r--.
$ ln -s /tmp/reply /etc/passwd
< wait for root to run liloconfig-color >
- Источник
- www.exploit-db.com