pimd 2.1.5 and possibly earlier versions allows user-assisted local users to overwrite arbitrary files via a symlink attack on (1) pimd.dump when a USR1 signal is sent, or (2) pimd.cache when USR2 is sent.Referenceshttp://www.debian.org/security/2011/dsa-2147http://secunia.com/advisories/42793http://www.openwall.com/lists/oss-security/2011/01/07/3http://www.openwall.com/lists/oss-security/2011/01/07/4http://secunia.com/advisories/42759https://exchange.xforce.ibmcloud.com/vulnerabilities/64528http://www.securityfocus.com/bid/45715http://www.vupen.com/english/advisories/2011/0113http://www.osvdb.org/70305