Nessus Plugin #15723
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200411-22] Davfs2, lvm-user: Insecure tempfile handling
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- Davfs2, lvm-user: Insecure tempfile handling
- Version:
- $Revision: 1.1 $
- Cve_id:
- CAN-2004-0972
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200411-22
- Description:
- The remote host is affected by the vulnerability described in GLSA-200411-22
(Davfs2, lvm-user: Insecure tempfile handling)
Florian Schilhabel from the Gentoo Linux Security Audit Team found
that Davfs2 insecurely created .pid files in /tmp. Furthermore, Trustix
Secure Linux found that the lvmcreate_initrd script, included in the
lvm-user Gentoo package, also creates temporary files in
world-writeable directories with predictable names.
Impact
A local attacker could create symbolic links in the temporary
files directory, pointing to a valid file somewhere on the filesystem.
When Davfs2 or lvmcreate_initrd is called, this would result in the
file being overwritten with the rights of the user running the
software, which could be the root user.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0972
Solution:
All Davfs2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1"
All lvm-user users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2"
Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.