← Retour aux CVEs
CVE-2011-0702
N/ADescription
The feh_unique_filename function in utils.c in feh before 1.11.2 might allow local users to overwrite arbitrary files via a symlink attack on a /tmp/feh_ temporary file.
Details CVE
Score CVSS v3.1N/A
Publie2/14/2011
Derniere modification4/29/2026
Sourcenvd
Observations honeypot0
Produits affectes
feh_project:feh
Faiblesses (CWE)
CWE-59
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035(secalert@redhat.com)
http://openwall.com/lists/oss-security/2011/02/09/1(secalert@redhat.com)
http://openwall.com/lists/oss-security/2011/02/09/14(secalert@redhat.com)
http://secunia.com/advisories/43221(secalert@redhat.com)
https://bugs.launchpad.net/ubuntu/+source/feh/+bug/607328(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=676389(secalert@redhat.com)
https://derf.homelinux.org/git/feh/commit/?id=23421a86cc826dd30f3dc4f62057fafb04b3ac40(secalert@redhat.com)
https://derf.homelinux.org/git/feh/commit/?id=29ab0855f044ef2fe9c295b72abefcb37f0861a5(secalert@redhat.com)
https://github.com/derf/feh/issues/#issue/32(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/02/09/1(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/02/09/14(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43221(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.launchpad.net/ubuntu/+source/feh/+bug/607328(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=676389(af854a3a-2127-422b-91ae-364da2661108)
https://derf.homelinux.org/git/feh/commit/?id=23421a86cc826dd30f3dc4f62057fafb04b3ac40(af854a3a-2127-422b-91ae-364da2661108)
https://derf.homelinux.org/git/feh/commit/?id=29ab0855f044ef2fe9c295b72abefcb37f0861a5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/derf/feh/issues/#issue/32(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.