Impact
The install utility in uutils coreutils implements a two‑step file creation, first unlinking an existing destination and then creating the new file without the O_EXCL flag. The time gap between unlinking and recreating the file allows a local attacker to create a symbolic link that redirects the write operation to an arbitrary system file. The result is that privileged writes can be redirected to overwrite existing files, compromising the integrity of the affected system. This flaw is a classic Time‑of‑Check to Time‑of‑Use (CWE‑367) weakness.
Affected Systems
The affected product is uutils coreutils. No specific affected release version is listed in the CVE data, so all versions prior to the fix should be considered vulnerable.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known active exploitation in the wild. The attack vector is local; a user with write access to the installation paths can target the race condition. No remote exploitation path is documented in the provided description.
OpenCVE Enrichment