Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
2004-08-18T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 2.1 (LOW)
AV:L/AC:L/Au:N/C:N/I:P/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sgi | propack | 2.4 | Yes |
Application | sgi | propack | 3.0 | Yes |
Application | utempter | utempter | 0.5.2 | Yes |
Application | utempter | utempter | 0.5.3 | Yes |
Operating System | slackware | slackware_linux | * | Yes |
Operating System | slackware | slackware_linux | 9.1 | Yes |