vendor:
mgetty
by:
SecurityFocus
7.2
CVSS
HIGH
Symbolic Link Following
59
CWE
Product Name: mgetty
Affected Version From: mgetty 1.1.20
Affected Version To: mgetty 1.1.25
Patch Exists: YES
Related CWE: N/A
CPE: a:gert_doering:mgetty
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, OpenBSD, FreeBSD
2002
Vulnerability in mgetty package
A vulnerability exists in a portion of the mgetty package, by Gert Doering. By exploiting a flaw in the faxrunq and faxrunqd programs, it is possible for local users to create arbitrary files, and alter arbitrary files on the filesystem. This in turn can lead to local root compromise. The faxrunq and faxrunqd programs will follow symbolic links. By creating a symbolic link named .last_run in /var/spool/fax/outgoing, and running the faxrunqd or faxrunq program, arbitrary files can be created. Existing files will have their contents overwritten.
Mitigation:
Users should ensure that the faxrunq and faxrunqd programs are not installed, or that they are not accessible to untrusted users.