4.6
CVE-2008-0167
- EPSS 1.07%
- Veröffentlicht 18.05.2008 14:20:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Gforge ≫ Gforge Version4.5.14
Debian ≫ Debian Linux Version4.0
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions390
Debian ≫ Debian Linux Version4.0 Editionsparc
Debian ≫ Debian Linux Version4.0 Editionalpha
Debian ≫ Debian Linux Version4.0 Editionamd64
Debian ≫ Debian Linux Version4.0 Editionarm
Debian ≫ Debian Linux Version4.0 Editionhppa
Debian ≫ Debian Linux Version4.0 Editionia-32
Debian ≫ Debian Linux Version4.0 Editionia-64
Debian ≫ Debian Linux Version4.0 Editionm68k
Debian ≫ Debian Linux Version4.0 Editionmips
Debian ≫ Debian Linux Version4.0 Editionmipsel
Debian ≫ Debian Linux Version4.0 Editionpowerpc
Debian ≫ Debian Linux Version4.0 Editions390
Debian ≫ Debian Linux Version4.0 Editionsparc
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.07% | 0.768 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.