Nessus Plugin #15647

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200411-13] Portage, Gentoolkit: Temporary file vulnerabilities

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2004 Michel Arboi
Summary:
Portage, Gentoolkit: Temporary file vulnerabilities
Version:
$Revision: 1.3 $
Cve_id:
-
Bugtraq_id:
11616, 11617
Xrefs:
GLSA:200411-13
Description:
The remote host is affected by the vulnerability described in GLSA-200411-13
(Portage, Gentoolkit: Temporary file vulnerabilities)


dispatch-conf and qpkg use predictable filenames for temporary files.

Impact

A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When an
affected script is called, this would result in the file to be overwritten
with the rights of the user running the dispatch-conf or qpkg, which could
be the root user.

Workaround

There is no known workaround at this time.


Solution:
All Portage users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/portage-2.0.51-r3"
All Gentoolkit users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-portage/gentoolkit-0.2.0_pre8-r1"


Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.