CVE-2008-4085
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
15/09/2008
Last modified:
09/04/2025
Description
plaiter in Plait before 1.6 allows local users to overwrite arbitrary files via a symlink attack on (1) cut.$$, (2) head.$$, (3) awk.$$, and (4) ps.$$ temporary files in /tmp/.
Impact
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:stephenjungels:plait:*:*:*:*:*:*:*:* | 1.5.2 (including) | |
| cpe:2.3:a:stephenjungels:plait:0.50:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.52:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.53:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.54:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.55:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.55.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.55.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:0.99:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:stephenjungels:plait:1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496381
- http://dev.gentoo.org/~rbu/security/debiantemp/plait
- http://secunia.com/advisories/31617
- http://sourceforge.net/project/shownotes.php?group_id=147849&release_id=623154
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- http://www.securityfocus.com/bid/30928
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44786
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496381
- http://dev.gentoo.org/~rbu/security/debiantemp/plait
- http://secunia.com/advisories/31617
- http://sourceforge.net/project/shownotes.php?group_id=147849&release_id=623154
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- http://www.securityfocus.com/bid/30928
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44786



