mailing list archives
CERT Vendor-Initiated Bulletin VB-97.05 - Vul in Lynx Temporary
From: dube0866 () EUROBRETAGNE FR (Nicolas Dubee)
Date: Sat, 1 Jan 1994 23:09:09 +0100
plaguez security advisory n. 7
Program: the admin-v1.2 package, a system administration
Version: current (v1.2)
OS: verified on Linux, maybe others too.
Problem: temporary files / symlinks
Impact: any file on an affected system can be overwritten,
regardless of access permissions.
this week, I'll focus on a little sysadmin tool
called admin-v1.2 (found on Sunsite: system/Admin/),
and I'll show how several little vulnerabilities
can be exploited to trash any file on an affected
as always, sorry if it's known stuff.
Several vulnerabilities exist in the admin-v1.2 package,
an interactive system managment tool by Emmett Sauer and
Linux Business Systems.
By exploiting those vulnerabilities, local users can erase
arbitrary files on the system, regardless of access permissions.
admin-v1.2 does not properly handle temporary files. It writes
user menu choices and more to temporary files in the /tmp directory.
These files are named using the syntax /tmp/name.$$, some do
not even use the $$ suffix. Unfortunatly, admin-v1.2 does not
check if these files exist and will follow symlinks. It is then
possible to overwrite any file on the system.
An attacker could for example link any of these temporary files to
/etc/passwd or /.rhosts and wait for the administrator to use
admin-v1.2. The target file would be erased or trashed with
random data. It may also be possible to use admin-v1.2 to gain
root privileges, though I did not manage to do it.
Remove the admin-v1.2 package.
well, that's it for this week. Next week, next hole ! :)
dube0866 () eurobretagne fr
_Free_ security probes, Unix programming.
ps.: the above url courtesy of TheFloyd.