CVE-2008-5394 : Detail

CVE-2008-5394

A01-Broken Access Control
0.08%V4
Local
2008-12-08
23h00 +00:00
2018-10-11
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 7313

Publication date : 2008-11-30 23h00 +00:00
Author : Paul Szabo
EDB Verified : Yes

Products Mentioned

Configuraton 0

Debian>>Shadow >> Version 4.0.18.1

References

http://osvdb.org/52200
Tags : vdb-entry, x_refsource_OSVDB
http://bugs.debian.org/505271
Tags : x_refsource_CONFIRM
http://www.securityfocus.com/bid/32552
Tags : vdb-entry, x_refsource_BID
http://bugs.debian.org/332198
Tags : x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200903-24.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDVSA-2009:062
Tags : vendor-advisory, x_refsource_MANDRIVA
https://www.exploit-db.com/exploits/7313
Tags : exploit, x_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/4695
Tags : third-party-advisory, x_refsource_SREASON
http://bugs.debian.org/505071
Tags : x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-695-1
Tags : vendor-advisory, x_refsource_UBUNTU