AIX techlibss Symbolic Link Vulnerability...

- AV AC AU C I A
发布: 2000-01-10
修订: 2025-04-13

When installing AIX updates from the monthly IBM support CDs, a binary called techlibss is run as root. "techlibss" creates log files in /tmp with known filenames, allowing an attacker to create malicious symbolic links in /tmp (with the known names). techlibss will follow these symbolic links, writing to wherever they point. Because of this and the fact that techlibss is run as root, it is possible to overwrite any file on the filesystem, if a symbolic link is exists, when techlibss is executed. Unfortunately there is no information at this time (January 17, 2000) about what the known filename(s) is/are for the file(s) created by techlibss in /tmp.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息