Calife has been reported prone to a local memory corruption vulnerability. The issue is likely due to a lack of sufficient sanity checks performed on certain sequences of data that is read from the file "/etc/calife.auth". Due to the nature of this vulnerability, it has been conjectured that a local user who has write access to the "/etc/calife.auth" configuration file may potentially leverage this issue to have arbitrary instructions executed in the context of the root user.
Calife has been reported prone to a local memory corruption vulnerability. The issue is likely due to a lack of sufficient sanity checks performed on certain sequences of data that is read from the file "/etc/calife.auth". Due to the nature of this vulnerability, it has been conjectured that a local user who has write access to the "/etc/calife.auth" configuration file may potentially leverage this issue to have arbitrary instructions executed in the context of the root user.