In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tesseract project tesseract 2.03 |
||
tesseract project tesseract 2.04 |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |