Link following in Gnash - CVE-2010-4337
Published: January 15, 2011 / Updated: August 11, 2020
Gnash
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.