CVE-2003-0440
CVSS4.6
发布时间 :2003-08-18 00:00:00
修订时间 :2008-09-10 15:19:00
NMCOS    

[原文]The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.


[CNNVD]SEMI/WEMI不安全方式创建临时文件漏洞(CNNVD-200308-102)

        
        semi是GNU Emacs的MIME库。
        semi在建立临时文件时不充分进行安全检查,本地攻击者可以利用这个漏洞 通过符号连接攻击以运行Emacs和semi用户进程权限破坏系统任意文件。
        wemi是semi的一个派生,同样存在此问题。目前没有提供详细漏洞细节。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:semi:semi:1.14.3
cpe:/o:debian:debian_linux:3.0Debian Debian Linux 3.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:569Symlink Attack Vulnerability in semi/wemi MIME Libraries
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0440
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0440
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-102
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2003-234.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:234
http://www.debian.org/security/2003/dsa-339
(VENDOR_ADVISORY)  DEBIAN  DSA-339
http://www.redhat.com/support/errata/RHSA-2003-231.html
(UNKNOWN)  REDHAT  RHSA-2003:231

- 漏洞信息

SEMI/WEMI不安全方式创建临时文件漏洞
中危 访问验证错误
2003-08-18 00:00:00 2005-10-20 00:00:00
本地  
        
        semi是GNU Emacs的MIME库。
        semi在建立临时文件时不充分进行安全检查,本地攻击者可以利用这个漏洞 通过符号连接攻击以运行Emacs和semi用户进程权限破坏系统任意文件。
        wemi是semi的一个派生,同样存在此问题。目前没有提供详细漏洞细节。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2003/dsa-339

- 漏洞信息

12015
semi/wemi MIME Library Symlink Arbitrary File Overwrite
Local Access Required Race Condition

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-07-06 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SEMI/WEMI Insecure Temporary File Creation Vulnerability
Access Validation Error 8115
No Yes
2003-07-07 12:00:00 2009-07-11 10:56:00
This vulnerability has been disclosed in a Debian advisory.

- 受影响的程序版本

semi semi 1.14.5
+ Gentoo Linux 1.4 _rc3
semi semi 1.14.3
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ Yellow Dog Linux 3.0
Debian Linux 3.0

- 漏洞讨论

SEMI/WEMI have been reported prone to an insecure temporary file creation vulnerability. As a result, it may be possible for local attackers to corrupt files owned by the user who is invoking a version of Emacs that is linked to the vulnerable library.

It should be noted that the impact of this vulnerability might be exaggerated by the fact that attackers may potentially influence content that will be added to the target file.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Debian has released an advisory (DSA 339-1) and fixes to address this issue. Further information regarding applying fixes for stable and unstable versions of Debian Linux can be found in the referenced advisory.

Yellow Dog has released an advisory with fixes to address this issue.

Red Hat has released advisory RHSA-2003:234-01 to address this issue. See referenced advisory for additional details and fix information. RHSA-2003:231-10 was also released to provide updates for Red Hat Enterprise distributions. Enterprise fixes are available exclusively from the Red Hat Network.

Gentoo has released an advisory and fixes. Users should perform the following commands to upgrade:

emerge sync
emerge semi
emerge clean


semi semi 1.14.3

Debian Linux 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站