CVE-2004-0233

Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:a:utempter:utempter:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:utempter:utempter:0.5.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-08-18 04:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-0233

Mitre link : CVE-2004-0233

CVE.ORG link : CVE-2004-0233


JSON object : View

Products Affected

utempter

  • utempter

sgi

  • propack

slackware

  • slackware_linux