crypto-utils 'genkey' Script CVE-2012-3504 Insecure Temporary File Handling Vulnerability

crypto-utils is prone to a vulnerability regarding the handling of temporary files.

Successful exploits may allow attackers to mount a symlink attack, which may allow the attacker to overwrite or corrupt sensitive files. This may result in a denial-of-service condition. Other attacks may also be possible.


 

Privacy Statement
Copyright 2010, SecurityFocus