Vulnerabilities
Vulnerable Software
Gentoo:  >> Rootkit Hunter  Security Vulnerabilities
The (1) check_update.sh and (2) rkhunter script in Rootkit Hunter before 1.2.3-r1 create temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack.
CVSS Score
2.1
EPSS Score
0.001
Published
2005-04-26


Contact Us

Shodan ® - All rights reserved