Vulnerability CVE-2008-0525: Information

Description

PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.

Severity: MEDIUM (4.6)

Published: Jan. 31, 2008
Modified: Oct. 16, 2018
Error type identifier: CWE-59

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
kernel-image-std-debugsisyphus4.14.85-alt16.1.91-alt1ALT-PU-2018-2754-1217182Fixed
kernel-image-std-debugc9f24.14.85-alt14.19.102-alt1ALT-PU-2018-2754-1217182Fixed
kernel-image-std-defsisyphus4.14.85-alt16.1.91-alt1ALT-PU-2018-2755-1217183Fixed
kernel-image-std-defp104.14.85-alt15.10.216-alt1ALT-PU-2018-2755-1217183Fixed
kernel-image-std-defp94.14.85-alt15.4.275-alt1ALT-PU-2018-2755-1217183Fixed
kernel-image-std-defp84.9.143-alt0.M80P.14.9.337-alt0.M80P.1ALT-PU-2018-2807-1217409Fixed
kernel-image-std-defc9f24.14.85-alt15.10.214-alt0.c9f.2ALT-PU-2018-2755-1217183Fixed
kernel-image-std-defc74.4.183-alt0.M70C.14.4.277-alt0.M70C.1ALT-PU-2019-2175-1233233Fixed
kernel-image-std-paec9f24.14.86-alt14.19.72-alt1ALT-PU-2018-2814-1217123Fixed
kernel-image-un-defp84.14.87-alt0.M80P.14.19.310-alt0.M80P.1ALT-PU-2018-2832-1217631Fixed
kernel-image-un-defc74.9.277-alt0.M70C.14.9.277-alt0.M70C.1ALT-PU-2021-3032-1281292Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      Running on/with:
      cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.2:*:unix:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.2:*:mac:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.2:*:linux:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.3:*:linux:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.3:*:unix:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.3:*:mac:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.4:*:unix:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.4:*:linux:*:*:*:*:*

      cpe:2.3:a:lumension_security:patchlink_update:6.4:*:mac:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:unix:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:linux:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:mac:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:mac:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:unix:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:linux:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:mac:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:linux:*:*:*:*:*

      cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:unix:*:*:*:*:*