It has been reported that rident.pl may be prone to a symbolic link vulnerability that may allow an attacker to corrupt or overwrite arbitrary files. This issue exists because the script writes output to a temporary file as 'rident.pid' in 'tmp' directory. It has been reported that a user will require root privileges to invoke the affected script; this may increase the impact of this vulnerability.
It has been reported that rident.pl may be prone to a symbolic link vulnerability that may allow an attacker to corrupt or overwrite arbitrary files. This issue exists because the script writes output to a temporary file as 'rident.pid' in 'tmp' directory. It has been reported that a user will require root privileges to invoke the affected script; this may increase the impact of this vulnerability.