National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-4191 Detail

Description

extract-table.pl in Emacspeak 26 and 28 allows local users to overwrite arbitrary files via a symlink attack on the extract-table.csv temporary file.

Source:  MITRE      Last Modified:  09/24/2008

Quick Info

CVE Dictionary Entry:
CVE-2008-4191
Original release date:
09/24/2008
Last revised:
08/07/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.6 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:N/I:C/A:C) (legend)
Impact Subscore:
9.2
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (10/17/2008)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=460435 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496431 External Source CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496431
http://dev.gentoo.org/~rbu/security/debiantemp/emacspeak External Source CONFIRM http://dev.gentoo.org/~rbu/security/debiantemp/emacspeak
http://www.openwall.com/lists/oss-security/2008/10/30/2 External Source MLIST [oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire
http://www.securityfocus.com/bid/31241 External Source BID 31241
https://bugs.gentoo.org/show_bug.cgi?id=235770 External Source CONFIRM https://bugs.gentoo.org/show_bug.cgi?id=235770
https://bugzilla.redhat.com/show_bug.cgi?id=460435 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=460435
https://exchange.xforce.ibmcloud.com/vulnerabilities/45237 External Source XF emacspeak-extracttable-symlink(45237)
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00010.html External Source FEDORA FEDORA-2008-8379
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00012.html External Source FEDORA FEDORA-2008-8423

Technical Details

Vulnerability Type (View All)

Change History 2 change records found - show changes