summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200410-19.xml
blob: 97d3496f10a35ee8517ddb3c2820a30176052315 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200410-19">
  <title>glibc: Insecure tempfile handling in catchsegv script</title>
  <synopsis>
    The catchsegv script in the glibc package is vulnerable to symlink attacks,
    potentially allowing a local user to overwrite arbitrary files with the
    rights of the user running the script.
  </synopsis>
  <product type="ebuild">glibc</product>
  <announced>2004-10-21</announced>
  <revised count="01">2004-10-21</revised>
  <bug>66358</bug>
  <access>local</access>
  <affected>
    <package name="sys-libs/glibc" auto="yes" arch="*">
      <unaffected range="rge">2.2.5-r9</unaffected>
      <unaffected range="rge">2.3.2-r12</unaffected>
      <unaffected range="rge">2.3.3.20040420-r2</unaffected>
      <unaffected range="rge">2.3.4.20040619-r2</unaffected>
      <unaffected range="ge">2.3.4.20040808-r1</unaffected>
      <vulnerable range="le">2.3.4.20040808</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    glibc is a package that contains the GNU C library.
    </p>
  </background>
  <description>
    <p>
    The catchsegv script creates temporary files in world-writeable directories
    with predictable names.
    </p>
  </description>
  <impact type="normal">
    <p>
    A local attacker could create symbolic links in the temporary files
    directory, pointing to a valid file somewhere on the filesystem. When
    catchsegv script is called, this would result in the file being overwritten
    with the rights of the user running the utility, which could be the root
    user.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All glibc users should upgrade to the latest version:
    </p>
    <code>
    # emerge sync

    # emerge -pv sys-libs/glibc
    # emerge sys-libs/glibc</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968">CAN-2004-0968</uri>
  </references>
  <metadata tag="requester" timestamp="2004-10-20T14:29:16Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2004-10-20T14:29:39Z">
    koon
  </metadata>
  <metadata tag="submitter" timestamp="2004-10-20T16:11:58Z">
    lewk
  </metadata>
</glsa>