Upstream information
Description
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 7.2 | 
| Vector | AV:L/AC:L/Au:N/C:C/I:C/A:C | 
| Access Vector | Local | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Complete | 
| Integrity Impact | Complete | 
| Availability Impact | Complete | 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:35:35 2013CVE page last modified: Mon Oct 6 18:15:26 2025