Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[ GLSA 200407-01 ] Esearch: Insecure temp file handling
From: "Joshua J. Berry" <condordes () gentoo org>
Date: Thu, 1 Jul 2004 11:01:46 -0700

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200407-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Esearch: Insecure temp file handling
      Date: July 01, 2004
      Bugs: #55424
        ID: 200407-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

The eupdatedb utility in esearch creates a file in /tmp without first
checking for symlinks. This makes it possible for any user to create
arbitrary files.

Background
==========

Esearch is a replacement for the Portage command "emerge search". It
uses an index to speed up searching of the Portage tree.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /   Vulnerable   /                Unaffected
    -------------------------------------------------------------------
  1  app-portage/esearch       <= 0.6.1                       >= 0.6.2

Description
===========

The eupdatedb utility uses a temporary file (/tmp/esearchdb.py.tmp) to
indicate that the eupdatedb process is running. When run, eupdatedb
checks to see if this file exists, but it does not check to see if it
is a broken symlink. In the event that the file is a broken symlink,
the script will create the file pointed to by the symlink, instead of
printing an error and exiting.

Impact
======

An attacker could create a symlink from /tmp/esearchdb.py.tmp to a
nonexistent file (such as /etc/nologin), and the file will be created
the next time esearchdb is run.

Workaround
==========

There is no known workaround at this time. All users should upgrade to
the latest available version of esearch.

Resolution
==========

All users should upgrade to the latest available version of esearch, as
follows:

    # emerge sync

    # emerge -pv ">=app-portage/esearch-0.6.2"
    # emerge ">=app-portage/esearch-0.6.2"

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

     http://security.gentoo.org/glsa/glsa-200407-01.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Technologies, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

Attachment: _bin
Description:


  By Date           By Thread  

Current thread:
  • [ GLSA 200407-01 ] Esearch: Insecure temp file handling Joshua J. Berry (Jul 01)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault