Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 12 Dec 2011 10:39:50 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>
Subject: Re: CVE request: rocksndiamonds world-writable working/config
 directory

On 12/12/2011 09:24 AM, Vincent Danen wrote:
> rocksndiamonds creates its ~/.rocksndiamonds/ directory as
> world-writable.  This could allow a local attacker to replace a cache
> file with a symbolic link to a file they would not otherwise have access
> to, and the next time the victim loaded the game, it would be
> overwritten.
>
> Could a CVE be assigned to this please?
>
> References:
>
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651620
> https://bugzilla.redhat.com/show_bug.cgi?id=766805
>
Please use CVE-2011-4606 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.