vendor:
lmail
by:
Charles Stevenson
7.2
CVSS
HIGH
Race Condition
362
CWE
Product Name: lmail
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001
lmail Race Condition Vulnerability
A race condition vulnerability exists in lmail. The lmail program makes insecure use of temporary files, making it susceptible to symbolic link attacks. The program also writes data from the standard input stream (stdin) directly to the temporary file. Because lmail is usually installed setuid root, it may be possible for a local user to overwrite any file on a system with arbitrary data.
Mitigation:
Ensure that lmail is not installed with setuid root privileges.