CVE-2008-4108
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
18/09/2008
Last modified:
09/04/2025
Description
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
- http://marc.info/?l=oss-security&m=122148330903513&w=2
- http://marc.info/?l=oss-security&m=122152861617434&w=2
- http://securityreason.com/securityalert/4274
- http://www.securityfocus.com/bid/31184
- http://www.securitytracker.com/id?1020904=
- http://www.vupen.com/english/advisories/2008/2659
- https://bugzilla.redhat.com/show_bug.cgi?id=462326
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
- http://marc.info/?l=oss-security&m=122148330903513&w=2
- http://marc.info/?l=oss-security&m=122152861617434&w=2
- http://securityreason.com/securityalert/4274
- http://www.securityfocus.com/bid/31184
- http://www.securitytracker.com/id?1020904=
- http://www.vupen.com/english/advisories/2008/2659
- https://bugzilla.redhat.com/show_bug.cgi?id=462326
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45161



