[Please upgrade if a new glibc version is available for your
distribution. The bug is definitely present in Gentoo and Trustix, no
information available yet about others -- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature";
boundary="=-JwO86ArBzSafu1eGRbOE"
Message-Id: <[EMAIL PROTECTED]>
From: Luke Macken <[EMAIL PROTECTED]>
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: [Full-Disclosure] [ GLSA 200410-19 ] glibc: Insecure tempfile handling in
catchsegv
script
Date: Thu, 21 Oct 2004 09:45:10 -0400
--=-JwO86ArBzSafu1eGRbOE
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: glibc: Insecure tempfile handling in catchsegv script
Date: October 21, 2004
Bugs: #66358
ID: 200410-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D
The catchsegv script in the glibc package is vulnerable to symlink
attacks, potentially allowing a local user to overwrite arbitrary
files with the rights of the user running the script.
Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
glibc is a package that contains the GNU C library.
Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-libs/glibc <=3D 2.3.4.20040808 *>=3D 2.2.5-r9
*>=3D 2.3.2-r12
*>=3D 2.3.3.20040420-r2
*>=3D 2.3.4.20040619-r2
>=3D 2.3.4.20040808-r1
Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
The catchsegv script creates temporary files in world-writeable
directories with predictable names.
Impact
=3D=3D=3D=3D=3D=3D
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When
catchsegv script is called, this would result in the file being
overwritten with the rights of the user running the utility, which
could be the root user.
Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
There is no known workaround at this time.
Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
All glibc users should upgrade to the latest version:
# emerge sync
# emerge -pv sys-libs/glibc
# emerge sys-libs/glibc
References
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
[ 1 ] CAN-2004-0968
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0968
Availability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200410-19.xml
Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=3D=3D=3D=3D=3D=3D=3D
Copyright 2004 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/1.0
--=-JwO86ArBzSafu1eGRbOE
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQBBd71lRsm3eDkOu7kRAmcSAJ9TV7Psrvb6eMdECTd1B57DYlYoNQCfUnc9
oZQ+4YCHFRjqUnZC7U2InrE=
=ibOH
-----END PGP SIGNATURE-----
--=-JwO86ArBzSafu1eGRbOE--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
------------------------------
End of this Digest
******************
--
Raj Mathur [EMAIL PROTECTED] http://kandalaya.org/
GPG: 78D4 FC67 367F 40E2 0DD5 0FEF C968 D0EF CC68 D17F
It is the mind that moves
-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help