Security bypass vulnerability in tempnam function in Apple Mac OS X via the dir and prefix argumentsID: oval:org.secpod.oval:def:3871 | Date: (C)2012-01-20 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the dir and prefix arguments. Successful exploitation could allow context-dependent attackers to bypass safe_mode restrictions,.
Platform: |
Apple Mac OS X 10.5 |
Apple Mac OS X Server 10.5 |
Apple Mac OS X 10.6 |
Apple Mac OS X Server 10.6 |