summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200412-05.xml
blob: 7ffad0f72fcbfd8e39bb88f3b6774f877cc6cc90 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200412-05">
  <title>mirrorselect: Insecure temporary file creation</title>
  <synopsis>
    mirrorselect is vulnerable to symlink attacks, potentially allowing a local
    user to overwrite arbitrary files.
  </synopsis>
  <product type="ebuild">mirrorselect</product>
  <announced>2004-12-07</announced>
  <revised count="04">2006-05-22</revised>
  <bug>73545</bug>
  <access>local</access>
  <affected>
    <package name="app-portage/mirrorselect" auto="yes" arch="*">
      <unaffected range="ge">0.89</unaffected>
      <vulnerable range="lt">0.89</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    mirrorselect is a tool to help select distfiles mirrors for Gentoo.
    </p>
  </background>
  <description>
    <p>
    Ervin Nemeth discovered that mirrorselect creates temporary files in
    world-writable directories with predictable names.
    </p>
  </description>
  <impact type="normal">
    <p>
    A local attacker could create symbolic links in the temporary files
    directory, pointing to a valid file somewhere on the filesystem. When
    mirrorselect is executed, this would result in the file being
    overwritten with the rights of the user running the utility, which
    could be the root user.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All mirrorselect users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=app-portage/mirrorselect-0.89"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
  </references>
  <metadata tag="submitter" timestamp="2004-12-06T21:43:32Z">
    lewk
  </metadata>
  <metadata tag="bugReady" timestamp="2004-12-06T21:51:32Z">
    lewk
  </metadata>
</glsa>