TITLE: cplay Insecure Temporary File Creation Vulnerability SECUNIA ADVISORY ID: SA11924 VERIFY ADVISORY: http://secunia.com/advisories/11924/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: Local system SOFTWARE: cplay 1.x http://secunia.com/product/3603/ DESCRIPTION: Martin Michlmayr has reported a vulnerability in cplay allowing malicious, local users to perform certain actions with escalated privileges. A temporary file is created insecurely in a predictable location, which can be exploited via symlink attacks to corrupt the content of arbitrary files with the privileges of a user invoking cplay. The vulnerability has been reported in version 1.49. Prior versions may also be affected. SOLUTION: Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: Martin Michlmayr ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------