Local users can use symlink attacks throughout a flaw on
trend-autoupdate script of MailScanner by using /tmp/opr.ini.#####
or /tmp/lpt temporary file (CVE-2008-5140).
Local users can use symlink attacks throughout flaws on
clamav-autoupdate, panda-autoupdate and rav-autoupdate scripts of
MailScanner by using ClamAV.update.log, pav.zip and RavBusy.lock
temporary files (CVE-2008-5312).
Local users can use symlink attacks throughout flaws on
kaspersky-wrapper, bitdefender-wrapper, rav-wrapper scripts and
Quarentine.pm, TNEF.pm, SA.pm, WorkArea.pm MailScanner perl modules
by using kavoutput.tmp.27073, log.bdc.27073, report.vir.27073,
MailScanner.ownertest.27073, tnef.27073 and MS.bayes.rebuild.lock
temporary files (CVE-2008-5313).
Further MailScanner had symlink flaws on antivir-autoupdate,
bitdefender-autoupdate, clamav-autoupdate, etrust-autoupdate,
generic-autoupdate, inoculan-autoupdate, kaspersky-autoupdate,
nod32-autoupdate, norman-autoupdate, rav-autoupdate,
sophos-autoupdate, symscanengine-autoupdate, vexira-autoupdate,
f-prot-autoupdate and css-autoupdate scripts under following
temporary vulnerable files: AntiVirBusy.lock, BitDefenderBusy.lock,
ClamAVBusy.lock, eTrustBusy.lock, GenericBusy.lock, InoculanBusy.lock,
KasperskyBusy.lock, Nod32Busy.lock, NormanBusy.lock, RavBusy.lock,
SophosBusy.lock, SymScanEngineBusy.lock, VexiraBusy.lock,
FProtBusy.lock and SYMCScan.lock.
This update provides fix for all symlink flaws described on this
security advisory.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cg ... -2008-5140
http://cve.mitre.org/cgi-bin/cvename.cg ... -2008-5312
http://cve.mitre.org/cgi-bin/cvename.cg ... -2008-5313
_______________________________________________________________________