Impact
The `go bug` command in the Go toolchain creates two temporary files with predictable names in the system temporary directory. Based on the description, it is inferred that an attacker who can write to that directory may replace one of those filenames with a symbolic link, causing `go bug` to overwrite the link target. This local file overwrite could modify critical files used by privileged processes, potentially leading to privilege escalation or denial of service.
Affected Systems
This vulnerability exists in the Go toolchain, specifically the `cmd/go` command `go bug`. No specific Go version numbers are listed in the advisory, so all current releases that lack a fix are considered potentially affected. The issue can occur on any platform where the system temporary directory (e.g., /tmp on Unix-like systems) is writable by the user executing `go bug`. Based on the description, it is inferred that the vulnerability requires writable temporary directory access by the user.
Risk and Exploitability
The flaw is local, requiring write access to the system temporary directory, a permission that is usually granted to all users on many systems. Because the exploit does not involve any network interaction or remote execution, an EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that if the target file is critical, the impact could be severe, but the exploitation likelihood is moderate, relying on local access to the temporary directory.
OpenCVE Enrichment