blob: 6c5e878694f05ff54cac6ac7a440a0652c421768 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200412-05">
<title>mirrorselect: Insecure temporary file creation</title>
<synopsis>
mirrorselect is vulnerable to symlink attacks, potentially allowing a local
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">mirrorselect</product>
<announced>2004-12-07</announced>
<revised>2006-05-22: 04</revised>
<bug>73545</bug>
<access>local</access>
<affected>
<package name="app-portage/mirrorselect" auto="yes" arch="*">
<unaffected range="ge">0.89</unaffected>
<vulnerable range="lt">0.89</vulnerable>
</package>
</affected>
<background>
<p>
mirrorselect is a tool to help select distfiles mirrors for Gentoo.
</p>
</background>
<description>
<p>
Ervin Nemeth discovered that mirrorselect creates temporary files in
world-writable directories with predictable names.
</p>
</description>
<impact type="normal">
<p>
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When
mirrorselect is executed, this would result in the file being
overwritten with the rights of the user running the utility, which
could be the root user.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All mirrorselect users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-portage/mirrorselect-0.89"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
</references>
<metadata tag="submitter" timestamp="2004-12-06T21:43:32Z">
lewk
</metadata>
<metadata tag="bugReady" timestamp="2004-12-06T21:51:32Z">
lewk
</metadata>
</glsa>
|