发布时间 :2003-08-18 00:00:00
修订时间 :2017-10-10 21:29:10

[原文]The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.


        semi是GNU Emacs的MIME库。
        semi在建立临时文件时不充分进行安全检查,本地攻击者可以利用这个漏洞 通过符号连接攻击以运行Emacs和semi用户进程权限破坏系统任意文件。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:3.0Debian Debian Linux 3.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:569Symlink Attack Vulnerability in semi/wemi MIME Libraries

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

中危 访问验证错误
2003-08-18 00:00:00 2005-10-20 00:00:00
        semi是GNU Emacs的MIME库。
        semi在建立临时文件时不充分进行安全检查,本地攻击者可以利用这个漏洞 通过符号连接攻击以运行Emacs和semi用户进程权限破坏系统任意文件。

- 公告与补丁


- 漏洞信息

semi/wemi MIME Library Symlink Arbitrary File Overwrite
Local Access Required Race Condition

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-07-06 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SEMI/WEMI Insecure Temporary File Creation Vulnerability
Access Validation Error 8115
No Yes
2003-07-07 12:00:00 2009-07-11 10:56:00
This vulnerability has been disclosed in a Debian advisory.

- 受影响的程序版本

semi semi 1.14.5
+ Gentoo Linux 1.4 _rc3
semi semi 1.14.3
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ Yellow Dog Linux 3.0
Debian Linux 3.0

- 漏洞讨论

SEMI/WEMI have been reported prone to an insecure temporary file creation vulnerability. As a result, it may be possible for local attackers to corrupt files owned by the user who is invoking a version of Emacs that is linked to the vulnerable library.

It should be noted that the impact of this vulnerability might be exaggerated by the fact that attackers may potentially influence content that will be added to the target file.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

Debian has released an advisory (DSA 339-1) and fixes to address this issue. Further information regarding applying fixes for stable and unstable versions of Debian Linux can be found in the referenced advisory.

Yellow Dog has released an advisory with fixes to address this issue.

Red Hat has released advisory RHSA-2003:234-01 to address this issue. See referenced advisory for additional details and fix information. RHSA-2003:231-10 was also released to provide updates for Red Hat Enterprise distributions. Enterprise fixes are available exclusively from the Red Hat Network.

Gentoo has released an advisory and fixes. Users should perform the following commands to upgrade:

emerge sync
emerge semi
emerge clean

semi semi 1.14.3

Debian Linux 3.0

- 相关参考