You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Many vulnerbilities involving files and file operations rely on a program anticipating that a file resides in a certain directory and then manipulating the file system in a way that makes that program access a different file than the intended. This is the technique used by many attacks targeting UNIX symlinks and Windows shortcuts. After the correct file has been opened, it is no longer vulnerable to symlink attacks so long as it is accessed via a file descriptor.

  • No labels