发布时间 :2005-10-07 14:02:00
修订时间 :2017-10-10 21:30:13

[原文]sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.

[CNNVD]Redhat Sysreport不安全临时文件创建漏洞(CNNVD-200510-059)

        sysreport 1.3.7之前版本可以使本地用户借助临时目录上的symlink攻击获取敏感信息。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9411sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  15379
(UNKNOWN)  XF  sysreport-race-condition(21770)

- 漏洞信息

Redhat Sysreport不安全临时文件创建漏洞
低危 竞争条件
2005-10-07 00:00:00 2009-07-21 00:00:00
        sysreport 1.3.7之前版本可以使本地用户借助临时目录上的symlink攻击获取敏感信息。

- 公告与补丁


- 漏洞信息

Linux sysreport Insecure Temporary File Information Disclosure
Information Disclosure
Loss of Confidentiality

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Redhat Sysreport Insecure Temporary File Creation Vulnerability
Race Condition Error 15379
No Yes
2005-08-09 12:00:00 2009-07-12 05:56:00
Bill Stearns is credited with the discovery of this vulnerability.

- 受影响的程序版本

RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core4
Red Hat Fedora Core3
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1

- 漏洞讨论

Redhat sysreport creates temporary files in an insecure manner. An attacker with local access could potentially exploit this issue to obtain sensitive information in the context of the affected computer.

Exploitation would most likely result in loss of confidentiality, data or a denial of service if critical files are overwritten in the attack. Other attacks may be possible as well.

- 漏洞利用

An exploit is not required.

- 解决方案

Redhat has released security update RHSA-2005:598-04 to address this issue; please see the referenced advisory for further details.

Redhat Fedora has released security update FEDORA-2005-1071 and FEDORA-2005-1072 to address this issue in Fedora Core 3 and 4; please see the referenced advisories for further details.

- 相关参考