Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200411-22] Davfs2, lvm-user: Insecure tempfile handling Vulnerability Scan

Vulnerability Scan Summary
Davfs2, lvm-user: Insecure tempfile handling

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200411-22
(Davfs2, lvm-user: Insecure tempfile handling)

Florian Schilhabel from the Gentoo Linux Security Audit Team found
that Davfs2 insecurely created .pid files in /tmp. Furthermore, Trustix
Secure Linux found that the lvmcreate_initrd script, included in the
lvm-user Gentoo package, also creates temporary files in
world-writeable directories with predictable names.


A local attacker could create symbolic links in the temporary
files directory, pointing to a valid file somewhere on the filesystem.
When Davfs2 or lvmcreate_initrd is called, this would result in the
file being overwritten with the rights of the user running the
software, which could be the root user.


There is no known workaround at this time.


All Davfs2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1"
All lvm-user users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2"

Threat Level: Medium

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.