This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-24 03:12:49 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
c5c17ead-8f23-11da-8c1d-000e0c2e438a | cvsbug -- race condition Problem description A temporary file is created, used, deleted, and then
re-created with the same name. This creates a window during
which an attacker could replace the file with a link to
another file. While cvsbug(1) is based on the send-pr(1)
utility, this problem does not exist in the version of
send-pr(1) distributed with FreeBSD. Impact A local attacker could cause data to be written to any file to which the user running cvsbug(1) (or send-pr(1) in FreeBSD 4.10 and 5.3) has write access. This may cause damage in itself (e.g., by destroying important system files or documents) or may be used to obtain elevated privileges. Workaround Do not use the cvsbug(1) utility on any system with untrusted
users. Discovery 2005-09-07 Entry 2006-01-27 Modified 2006-11-08 FreeBSD ge 5.4 lt 5.4_7 ge 5.3 lt 5.3_22 ge 4.11 lt 4.11_12 ge 4.10 lt 4.10_18 cvs+ipv6 < 1.11.17_1 CAN-2005-2693 SA-05:20.cvsbug |