Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Many vulnerbilities involving files and file operations rely on a program anticipating that a file resides in a certain directory and then manipulating the file system in a way that makes that program access a different file than the intended. This is the technique used by many attacks targeting UNIX symlinks and Windows shortcuts. After the correct file has been opened, it is no longer vulnerable to symlink attacks so long as it is accessed via a file descriptor.