Home page logo

oss-sec logo oss-sec mailing list archives

Re: CVE request: a2ps insecure temporary file use
From: Murray McAllister <mmcallis () redhat com>
Date: Tue, 04 Feb 2014 02:50:00 +1100

On 02/03/2014 05:12 PM, Murray McAllister wrote:

Jakub Wilk found that a2ps, a tool to convert text and other types of
files to PostScript, insecurely used a temporary file in spy_user(). A
local attacker could use this flaw to perform a symbolic link attack to
modify an arbitrary file accessible to the user running a2ps:


The original report notes there are calls to tempname_ensure(). If any
of those are found to be vulnerable, would they use the same CVE number,
or require a different one?



Murray McAllister / Red Hat Security Response Team

Tim Waugh pointed out this was fixed in 2001:


And notes http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch is the patch.


Murray McAllister / Red Hat Security Response Team

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]