Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian libmail-audit-perl 2.1-5 |