SB2014021502 - Link following in iproute2
Published: February 15, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Link following (CVE-ID: CVE-2012-1088)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
iproute2 before 3.3.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file used by (1) configure or (2) examples/dhcp-client-script.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=20ed7b24df05eadf83168d1d0ce0052a31380928
- http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commit;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- https://bugzilla.redhat.com/show_bug.cgi?id=797878