|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200506-08] GNU shtool, ocaml-mysql: Insecure temporary file creation Vulnerability Scan
Vulnerability Scan Summary GNU shtool, ocaml-mysql: Insecure temporary file creation
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200506-08
(GNU shtool, ocaml-mysql: Insecure temporary file creation)
Eric Romang has discovered that GNU shtool insecurely creates
temporary files with predictable filenames (CVE-2005-1751). On closer
inspection, Gentoo Security discovered that the shtool temporary file,
once created, was being reused insecurely (CVE-2005-1759).
Impact
A local attacker could create symbolic links in the temporary
files directory, pointing to a valid file somewhere on the filesystem.
When a GNU shtool script is executed, this would result in the file
being overwritten with the rights of the user running the script, which
could be the root user.
Workaround
There is no known workaround at this time.
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1751
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1759
Solution:
All GNU shtool users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-util/shtool-2.0.1-r2"
All ocaml-mysql users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-ml/ocaml-mysql-1.0.3-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|