cman is vulnerable to arbitrary file overwrites. The vulnerability exists as multiple insecure temporary file use flaws were found in fence_apc_snmp and ccs_tool. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack.
osvdb.org/50299
osvdb.org/50300
osvdb.org/50301
rhn.redhat.com/errata/RHSA-2009-1337.html
secunia.com/advisories/32602
secunia.com/advisories/32616
secunia.com/advisories/36530
secunia.com/advisories/36555
secunia.com/advisories/43367
secunia.com/advisories/43372
www.redhat.com/archives/fedora-package-announce/2008-November/msg00163.html
www.redhat.com/archives/fedora-package-announce/2008-November/msg00164.html
www.redhat.com/archives/fedora-package-announce/2008-November/msg00165.html
www.redhat.com/security/updates/classification/#low
www.redhat.com/support/errata/RHSA-2009-1339.html
www.redhat.com/support/errata/RHSA-2009-1341.html
www.redhat.com/support/errata/RHSA-2011-0264.html
www.redhat.com/support/errata/RHSA-2011-0265.html
www.securityfocus.com/bid/32179
www.ubuntu.com/usn/USN-875-1
www.vupen.com/english/advisories/2011/0416
www.vupen.com/english/advisories/2011/0417
access.redhat.com/errata/RHSA-2009:1341
exchange.xforce.ibmcloud.com/vulnerabilities/46412
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11404