CVE-2009-5044
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
24/06/2011
Last modified:
11/04/2025
Description
contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
Impact
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.10.4 (including) | |
| cpe:2.3:a:gnu:groff:*:*:*:*:*:*:*:* | 1.20.1 (including) | |
| cpe:2.3:a:gnu:groff:1.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.11a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.16.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.17.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.17.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.18.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.19.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:groff:1.19.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://ftp.gnu.org/gnu/groff/groff-1.20.1-1.21.diff.gz
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2%3D1.2%3Bf%3Dh
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://openwall.com/lists/oss-security/2009/08/09/1
- http://openwall.com/lists/oss-security/2009/08/10/2
- http://openwall.com/lists/oss-security/2009/08/14/4
- http://openwall.com/lists/oss-security/2009/08/14/5
- http://secunia.com/advisories/44999
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A085
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A086
- http://www.securityfocus.com/bid/36381
- https://support.apple.com/kb/HT205031
- ftp://ftp.gnu.org/gnu/groff/groff-1.20.1-1.21.diff.gz
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2%3D1.2%3Bf%3Dh
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://openwall.com/lists/oss-security/2009/08/09/1
- http://openwall.com/lists/oss-security/2009/08/10/2
- http://openwall.com/lists/oss-security/2009/08/14/4
- http://openwall.com/lists/oss-security/2009/08/14/5
- http://secunia.com/advisories/44999
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A085
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A086
- http://www.securityfocus.com/bid/36381
- https://support.apple.com/kb/HT205031



