header-logo
Suggest Exploit
vendor:
SCOadmin
by:
SecurityFocus
7.2
CVSS
HIGH
Local File Overwrite
377
CWE
Product Name: SCOadmin
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

SCOadmin Temporary File Overwrite Vulnerability

A vulnerability has been reported in the scoadmin utility that may allow a local attacker to overwrite any file. The vulnerability is due to the predictable naming of temporary files used by scoadmin. When writing to temporary files, there are no checks to ensure that it does not already exist. Symbolic links will also be followed. This behaviour may be exploited by local attackers to corrupt arbitrary files.

Mitigation:

Ensure that the scoadmin utility is not used in a shared environment, and that it is not accessible to untrusted users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4875/info

A vulnerability has been reported in the scoadmin utility that may allow a local attacker to overwrite any file. The vulnerability is due to the predictable naming of temporary files used by scoadmin. When writing to temporary files, there are no checks to ensure that it does not already exist. Symbolic links will also be followed. This behaviour may be exploited by local attackers to corrupt arbitrary files.

ln -s /etc/passwd /tmp/tclerror.1195.log

If the process ID of the SCOadmin process is 1195, /etc/passwd will be overwritten.