#VU101797 Insecure temporary file in socat - CVE-2024-54661


Vulnerability identifier: #VU101797

Vulnerability risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54661

CWE-ID: CWE-377

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
socat
Other software / Other software solutions

Vendor: www.dest-unreach.org

Description

The vulnerability allows a local user to overwrite arbitrary files on the system.

The vulnerability exists due to usage of a predictable temporary file name in readline.sh. A local user can create a symbolic link from the temporary file to an arbitrary files on the system and overwrite it with the application's output, corrupting the file.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

socat: 1.0.3.0 - 2.0.0


External links
https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/readline.sh#l29


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability