发布时间 :2004-02-17 00:00:00
修订时间 :2008-09-05 16:35:34

[原文]netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.



- CVSS (基础分值)

CVSS分值: 3.7 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:810Red Hat Enterprise 3 netpbm File Overwrite Vulnerability
oval:org.mitre.oval:def:804Red Hat netpbm File Overwrite Vulnerability
oval:org.mitre.oval:def:10978netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  netpbm-temp-insecure-file(14874)
(UNKNOWN)  SGI  20040201-01-U

- 漏洞信息

低危 竞争条件
2004-02-17 00:00:00 2006-09-21 00:00:00

- 公告与补丁


- 漏洞信息

Netpbm pnmindex Insecure Temporary File Creation
Local Access Required Race Condition
Loss of Integrity
Exploit Public

- 漏洞描述

pnmindex, one of the netpbm utilities, contains a flaw that may allow a malicious user to overwrite arbitrary files. Due to predictable temporary file names, an attacker can create symlinks in advance to exploit this flaw. It is possible that the flaw may allow for the overwriting and/or corruption of arbitrary files by the user invoking the vulnerable applications resulting in a loss of integrity.

- 时间线

2004-01-18 Unknow
2004-01-18 Unknow

- 解决方案

Upgrade to version 10.20 or higher, as it has been reported to fix this vulnerability. If an unofficial release is in use as provided by a third party vendor, vendor upgrades should be used. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Netpbm Temporary File Vulnerabilities
Race Condition Error 9442
No Yes
2004-01-18 12:00:00 2009-07-12 02:06:00
Announced by Debian.

- 受影响的程序版本

SGI ProPack 2.4
SGI ProPack 2.3
RedHat netpbm-progs-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat netpbm-devel-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat netpbm-9.24-10.i386.rpm
+ RedHat Linux 9.0 i386
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1
Red Hat 6.2 traceroute 1.4 a5
+ RedHat Linux 6.2 E sparc
+ RedHat Linux 6.2 E i386
+ RedHat Linux 6.2 E alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
Netpbm Netpbm 10.14
Netpbm Netpbm 10.13
Netpbm Netpbm 10.12
Netpbm Netpbm 10.11
Netpbm Netpbm 10.10
Netpbm Netpbm 10.9
Netpbm Netpbm 10.8
Netpbm Netpbm 10.7
Netpbm Netpbm 10.6
Netpbm Netpbm 10.5
Netpbm Netpbm 10.4
Netpbm Netpbm 10.3
Netpbm Netpbm 10.2
Netpbm Netpbm 10.1
Netpbm Netpbm 10.0
Netpbm Netpbm 9.25
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0
Netpbm Netpbm 9.24
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 8.0 i686
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ Sun Linux 5.0
Netpbm Netpbm 9.23
Netpbm Netpbm 9.22
Netpbm Netpbm 9.21
Netpbm Netpbm 9.20
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Netpbm Netpbm 9.14
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i586
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 athlon
+ RedHat Linux 7.2
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 7.0
Netpbm Netpbm 9.9
+ RedHat Linux 7.1 i686
+ RedHat Linux 7.1 i586
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1
Netpbm Netpbm 9.5
+ RedHat Linux 7.0 i686
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0

- 漏洞讨论

Debian has reported that Netpbm is affected by numerous vulnerabilities related to its use of temporary files. These vulnerabilities may allow for a malicious user to cause the corruption of files owned by other users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

SGI has released an advisory 20040202-01-U to address this and other issues in SGI ProPack 2.4. Please see the referenced advisory for more information. Fixes are available below.

Red Hat has released an advisory (RHSA-2004:031-02) and fixes to address this issue in Enterprise products. Customers who are subscribed to the Red Hat Network may obtain fixes by running the up2date utility. Further information can be found in the referenced advisory.

Debian has issued fixes. See advisory DSA-426-1 in the reference section.

RedHat has released an advisory RHSA-2004:030-01 with updated NetPBM packages to address this issue. Please see the referenced advisory for more information.

SGI has released an advisory 20040201-01-U with a patch to address this and other issues. Please see the referenced advisory for more information.

Mandrake has released advisory MDKSA-2004:011 with fixes to address this issue.

Mandrake has released advisory MDKSA-2004:011-1 along with updated fixes dealing with this issue. Apparently the previous patches failed to properly implement a call to 'mktemp' causing some failures. Reportedly there are no security issues around this update; it is simply a bug fix. Please see the referenced advisory for more information.

Gentoo Linux has released an advisory (GLSA 200410-02) along with an updated dealing with this issue. Gentoo advises that all Netpbm users should upgrade to an unaffected version:

# emerge sync

# emerge -pv ">=media-libs/netpbm-10.0"
# emerge ">=media-libs/netpbm-10.0"

For more information please see the referenced Gentoo Linux advisory for more information.

Conectiva has released advisory CLA-2004:909 to address these issues. Please see the referenced advisory for more information.

Turbolinux has released advisory 20050207 [TURBOLINUX SECURITY INFO] 07/Feb/2005 to address various issues. Please see the referenced advisory for more information.

RedHat netpbm-devel-9.24-10.i386.rpm

RedHat netpbm-9.24-10.i386.rpm

RedHat netpbm-progs-9.24-10.i386.rpm

SGI ProPack 2.3

SGI ProPack 2.4

Netpbm Netpbm 9.14

Netpbm Netpbm 9.20

Netpbm Netpbm 9.24

Netpbm Netpbm 9.25

- 相关参考