IM-Switch Insecure Temporary File...

- AV AC AU C I A
发布: 2004-07-13
修订: 2025-04-13

It is reported that im-switch is prone to a local insecure temporary file handling symbolic link vulnerability. This issue is due to a design error that allows the application to insecurely write to a temporary file that is created with a predictable file name. The im-switch utility will write to this temporary file before verifying its existence; this would facilitate a symbolic link attack. An attacker may exploit this issue to corrupt arbitrary files. This corruption may potentially result in the elevation of privileges, or in a system wide denial of service.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息