CVE-2014-4038

EUVD-2014-3969
ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
Affected Products (NVD)
VendorProductVersion
ppc64-diag_projectppc64-diag
2.6.1
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ppc64-diag
bookworm
2.7.9-1
fixed
bullseye
2.7.6-1
fixed
sid
2.7.9-1
fixed
trixie
2.7.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ppc64-diag
lucid
dne
precise
dne
saucy
dne
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected