CVE-2003-0656
CVSS2.1
发布时间 :2003-08-27 00:00:00
修订时间 :2016-10-17 22:36:24
NMCOS    

[原文]eroaster before 2.2.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file that is used as a lockfile.


[CNNVD]ERoaster本地以不安全方式创建临时文件漏洞(CNNVD-200308-114)

        
        eroaster是使用cdrecord刻录CD-R的前端软件。
        eroaster当建立临时文件用做lock文件时没有正确进行安全检查,本地攻击者可以利用这个漏洞通过符号链接以运行eroaster用户权限覆盖任意文件。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:eroaster:eroaster:2.2.0
cpe:/a:eroaster:eroaster:2.0.0
cpe:/a:eroaster:eroaster:2.1.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0656
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0656
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-114
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=106252649028401&w=2
(UNKNOWN)  BUGTRAQ  20030902 GLSA: eroaster (200309-04)
http://www.debian.org/security/2003/dsa-366
(VENDOR_ADVISORY)  DEBIAN  DSA-366
http://www.mandriva.com/security/advisories?name=MDKSA-2003:083
(UNKNOWN)  MANDRAKE  MDKSA-2003:083

- 漏洞信息

ERoaster本地以不安全方式创建临时文件漏洞
低危 访问验证错误
2003-08-27 00:00:00 2005-10-20 00:00:00
本地  
        
        eroaster是使用cdrecord刻录CD-R的前端软件。
        eroaster当建立临时文件用做lock文件时没有正确进行安全检查,本地攻击者可以利用这个漏洞通过符号链接以运行eroaster用户权限覆盖任意文件。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2003/dsa-366

- 漏洞信息

2143
ECLiPt eroaster Insecure Lockfile Creation

- 漏洞描述

ECLiPt eroaster (a GUI for the cdrecord and mkisofs utilities), creates temporary files in an insecure manner which may allow malicious users to over-write arbitrary files with the privileges of the user running eroaster.

- 时间线

2003-08-20 Unknow
Unknow Unknow

- 解决方案

Upgrade to eroaster-2.1.0-r2 or higher. On Mandrake, install the appropriate patch: 9.0/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm 9.0/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm 9.1/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm 9.1/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm corporate/2.1/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm corporate/2.1/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm On Debian, upgrade to 2.1.0.0.3-2woody1 or 2.2.0-0.5-1 (sid).

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ERoaster Local Insecure Temporary File Creation Vulnerability
Access Validation Error 8350
No Yes
2003-08-06 12:00:00 2009-07-11 10:56:00
Vulnerability announced by Debian.

- 受影响的程序版本

eroaster eroaster 2.2 .0
eroaster eroaster 2.1 .0
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
eroaster eroaster 2.0 .0
eroaster eroaster 2.2 .0
eroaster eroaster 2.1 .0
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0

- 不受影响的程序版本

eroaster eroaster 2.2 .0
eroaster eroaster 2.1 .0
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0

- 漏洞讨论

A problem has been reported in the secure creation of temporary files by the eroaster application. This may allow an attacker to overwrite files belonging to the eroaster user.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Debian has made fixes available in advisory DSA 366-1. See referenced advisory for additional details.

Mandrake has released an advisory (MDKSA-2003:083) that addresses this issue. Please see the attached advisory for details on obtaining and applying fixes.

Gentoo Linux has released a security advisory (200309-04) to address this issue. Users who are affected by this issue are advised to do the following:

emerge sync
emerge eroaster
emerge clean


eroaster eroaster 2.1 .0

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站