CVE-2005-1759
CVSS1.2
发布时间 :2005-06-28 00:00:00
修订时间 :2016-10-17 23:22:16
NMCOP    

[原文]Race condition in shtool 2.0.1 and earlier allows local users to modify or create arbitrary files via a symlink attack on temporary files after they have been created, a different vulnerability than CVE-2005-1751.


[CNNVD]GNU SHTool 不安全临时文件删除漏洞(CNNVD-200506-211)

        shtool 2.0.1及早期版本中的竞争条件允许本地用户在临时文件创建后,借助对其发起的symlink攻击,来修改或创建任意文件。

- CVSS (基础分值)

CVSS分值: 1.2 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1759
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1759
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200506-211
(官方数据源) CNNVD

- 其它链接及资源

http://bugs.gentoo.org/show_bug.cgi?id=93782
(PATCH)  MISC  http://bugs.gentoo.org/show_bug.cgi?id=93782
http://marc.info/?l=bugtraq&m=111955937622637&w=2
(UNKNOWN)  OPENPKG  OpenPKG-SA-2005.011
http://www.gentoo.org/security/en/glsa/glsa-200506-08.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200506-08
http://www.securityfocus.com/bid/13767
(UNKNOWN)  BID  13767

- 漏洞信息

GNU SHTool 不安全临时文件删除漏洞
低危 设计错误
2005-06-28 00:00:00 2005-10-25 00:00:00
本地  
        shtool 2.0.1及早期版本中的竞争条件允许本地用户在临时文件创建后,借助对其发起的symlink攻击,来修改或创建任意文件。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        GNU shTool 2.0.1
        OpenPKG shtool-2.0.1-2.3.1.src.rpm
        ftp://ftp.openpkg.org/release/2.3/UPD/shtool-2.0.1-2.3.1.src.rpm
        PHP PHP 4.0 0
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.1
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.1 pl1
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.1 pl2
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.2
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.3 pl1
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.3
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.4
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.5
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.6
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.7
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.7 RC1
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.7 RC3
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.0.7 RC2
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.1 .0
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        PHP PHP 4.1.1
        PHP PHP 4.4.0
        http://www.php.net/get/php-4.4.0.tar.bz2/from/a/mirror
        

- 漏洞信息 (F38149)

Gentoo Linux Security Advisory 200506-8 (PacketStormID:F38149)
2005-06-21 00:00:00
Gentoo  security.gentoo.org
advisory
linux,gentoo
CVE-2005-1751,CVE-2005-1759
[点击下载]

Gentoo Linux Security Advisory GLSA 200506-08 - Eric Romang has discovered that GNU shtool insecurely creates temporary files with predictable filenames (CVE-2005-1751). On closer inspection, Gentoo Security discovered that the shtool temporary file, once created, was being reused insecurely (CVE-2005-1759). Versions less than 2.0.1-r2 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200506-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: GNU shtool, ocaml-mysql: Insecure temporary file creation
      Date: June 11, 2005
      Bugs: #93782, #93784
        ID: 200506-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

GNU shtool and ocaml-mysql are vulnerable to symlink attacks,
potentially allowing a local user to overwrite arbitrary files.

Background
==========

GNU shtool is a compilation of small shell scripts into a single shell
tool. The ocaml-mysql package includes the GNU shtool code.

Affected packages
=================

    -------------------------------------------------------------------
     Package             /  Vulnerable  /                   Unaffected
    -------------------------------------------------------------------
  1  dev-util/shtool        < 2.0.1-r2                     >= 2.0.1-r2
  2  dev-ml/ocaml-mysql     < 1.0.3-r1                     >= 1.0.3-r1
    -------------------------------------------------------------------
     2 affected packages on all of their supported architectures.
    -------------------------------------------------------------------

Description
===========

Eric Romang has discovered that GNU shtool insecurely creates temporary
files with predictable filenames (CAN-2005-1751). On closer inspection,
Gentoo Security discovered that the shtool temporary file, once
created, was being reused insecurely (CAN-2005-1759).

Impact
======

A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When a
GNU shtool script is executed, this would result in the file being
overwritten with the rights of the user running the script, which could
be the root user.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GNU shtool users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-util/shtool-2.0.1-r2"

All ocaml-mysql users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-ml/ocaml-mysql-1.0.3-r1"

References
==========

  [ 1 ] CAN-2005-1751
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751
  [ 2 ] CAN-2005-1759
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200506-08.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

    

- 漏洞信息

17289
shtool Reused Temp Files Symlink Arbitrary File Overwrite
Local Access Required Race Condition
Loss of Integrity
Vendor Verified

- 漏洞描述

shtool contains a flaw that may allow a malicious local user to overwrite or create arbitrary files on the system. The problem is that the application creates and reuses temporary files insecurely. It is possible for a user to use a symlink style attack to manipulate arbitrary files, resulting in a loss of integrity.

- 时间线

2005-06-11 Unknow
Unknow Unknow

- 解决方案

Contact your vendor for an appropriate upgrade. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站