Total vulnerabilities in the database
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Software | From | Fixed in |
---|---|---|
sgi / propack | 3.0 | 3.0.x |
utempter / utempter | 0.5.2 | 0.5.2.x |
utempter / utempter | 0.5.3 | 0.5.3.x |
sgi / propack | 2.4 | 2.4.x |
slackware / slackware_linux | 9.1 | 9.1.x |
slackware / slackware_linux | - | - |