SB2014040601 - Link following in GNU a2ps



SB2014040601 - Link following in GNU a2ps

Published: April 6, 2014 Updated: August 3, 2020

Security Bulletin ID SB2014040601
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Link following (CVE-ID: CVE-2001-1593)

The vulnerability allows a local non-authenticated attacker to manipulate data.

The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.


Remediation

Install update from vendor's website.