2.1
CVSSv2

CVE-2004-0233

Published: 18/08/2004 Updated: 11/10/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.

Vulnerable Product Search on Vulmon Subscribe to Product

sgi propack 2.4

sgi propack 3.0

utempter utempter 0.5.2

utempter utempter 0.5.3

slackware slackware linux

slackware slackware linux 9.1

Vendor Advisories

Synopsis utempter security update Type/Severity Security Advisory: Moderate Topic An updated utempter package that fixes a potential symlink vulnerability isnow available Description Utempter is a utility that allows terminal applications such as xterm andscreen to update utmp and wtmp wit ...

Exploits

source: wwwsecurityfocuscom/bid/10178/info It has been reported that utempter is affected by multiple local vulnerabilities The first issue is due to an input validation error that causes the application to exit improperly; facilitating symbolic link attacks The second issue is due to a failure of the application to properly validate bu ...