A vulnerability has been reported in the Eject utility which may be exploited to obtain sensitive information. This vulnerability can be exploited by supplying the eject utility a sensitive file as an argument. When processed eject may return sensitive information regarding the existence of the file. This issue could be exploited by a malicious local user to gain information about the existence of files which reside in sensitive and typically unreadable locations.
A vulnerability has been reported in the Eject utility which may be exploited to obtain sensitive information. This vulnerability can be exploited by supplying the eject utility a sensitive file as an argument. When processed eject may return sensitive information regarding the existence of the file. This issue could be exploited by a malicious local user to gain information about the existence of files which reside in sensitive and typically unreadable locations.