← Volver a CVEs
CVE-2011-0702
N/ADescripcion
The feh_unique_filename function in utils.c in feh before 1.11.2 might allow local users to overwrite arbitrary files via a symlink attack on a /tmp/feh_ temporary file.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado2/14/2011
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
feh_project:feh
Debilidades (CWE)
CWE-59
Referencias
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035(secalert@redhat.com)
http://openwall.com/lists/oss-security/2011/02/09/1(secalert@redhat.com)
http://openwall.com/lists/oss-security/2011/02/09/14(secalert@redhat.com)
http://secunia.com/advisories/43221(secalert@redhat.com)
https://bugs.launchpad.net/ubuntu/+source/feh/+bug/607328(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=676389(secalert@redhat.com)
https://derf.homelinux.org/git/feh/commit/?id=23421a86cc826dd30f3dc4f62057fafb04b3ac40(secalert@redhat.com)
https://derf.homelinux.org/git/feh/commit/?id=29ab0855f044ef2fe9c295b72abefcb37f0861a5(secalert@redhat.com)
https://github.com/derf/feh/issues/#issue/32(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/02/09/1(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/02/09/14(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43221(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.launchpad.net/ubuntu/+source/feh/+bug/607328(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=676389(af854a3a-2127-422b-91ae-364da2661108)
https://derf.homelinux.org/git/feh/commit/?id=23421a86cc826dd30f3dc4f62057fafb04b3ac40(af854a3a-2127-422b-91ae-364da2661108)
https://derf.homelinux.org/git/feh/commit/?id=29ab0855f044ef2fe9c295b72abefcb37f0861a5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/derf/feh/issues/#issue/32(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.