http://secunia.com/advisories/12967/ A vulnerability has been reported in Kerberos V5, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The vulnerability is caused due to the "send-pr.sh" script creating temporary files insecurely. This can be exploited via symlink attacks to create or overwrite arbitrary files with the privileges of the user invoking the vulnerable script. The vulnerability has been reported in versions 1.3.4 and 1.3.5 for Linux. Other versions may also be affected. CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0971 Red Hat Bugzilla: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136307 Patch: https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=105432&action=view ------- Additional Comments From bugzilla.fedora.us 2005-01-29 14:27:08 ---- we also need to deal with CAN-2004-1189 ------- Additional Comments From pekkas 2005-03-01 06:00:21 ---- These are tackled in #2040, so I'll close this in order to not duplicate work. *** This bug has been marked as a duplicate of 2040 *** ------- Bug moved to this database by dkl 2005-03-30 18:29 ------- This bug previously known as bug 2267 at https://bugzilla.fedora.us/ https://bugzilla.fedora.us/show_bug.cgi?id=2267 Originally filed under the Fedora Legacy product and Package request component. Unknown priority P2. Setting to default priority "normal". Unknown platform PC. Setting to default platform "All". The original reporter of this bug does not have an account here. Reassigning to the person who moved it here, dkl. Previous reporter was fedora-legacy-bugzilla-2004. Setting qa contact to the default for this product. This bug either had no qa contact or an invalid one.
Changed to 'CLOSED' state since 'RESOLVED' has been deprecated.