int(762)

Vulnerability Bulletins


Uso inseguro de directorio temporal en logcheck

Vulnerability classification

Property Value
Confidence level Oficial
Impact Ocultacion del rastro
Dificulty Experto
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Logcheck <1.1.1

Description

Se ha descubierto una vulnerabilidad en logcheck. La explotación de esta vulnerabilidad podría permitir a un usuario local sobrescribir archivos con privilegios de root.

Logcheck utiliza un directorio temporal en /var/tmp sin tomar medidas de seguridad. Mientras este directorio sea creado cuando logcheck es instalado y mientras exista el directorio, el paquete no es vulnerable. Sin embargo, si en algún momento este directorio es eliminado el paquete es vulnerable.

Solution



Actualización de software

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.dsc
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.diff.gz
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1.orig.tar.gz
Paquetes independientes de arquitectura
http://security.debian.org/pool/updates/main/l/logcheck/logcheck-database_1.1.1-13.1woody1_all.deb
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1_all.deb
http://security.debian.org/pool/updates/main/l/logcheck/logtail_1.1.1-13.1woody1_all.deb

Mandrake Linux
Mandrake Linux 9.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/logcheck-1.1.1-9.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/logcheck-1.1.1-9.1.92mdk.src.rpm
Mandrake Linux 9.2/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/logcheck-1.1.1-9.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/logcheck-1.1.1-9.1.92mdk.src.rpm
Mandrake Linux 10.0
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/logcheck-1.1.1-9.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/logcheck-1.1.1-9.1.100mdk.src.rpm
Mandrake Linux 10.0/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/logcheck-1.1.1-9.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/logcheck-1.1.1-9.1.100mdk.src.rpm
Mandrake Linux 10.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/logcheck-1.1.1-9.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/logcheck-1.1.1-9.1.101mdk.src.rpm
Mandrake Linux 10.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/logcheck-1.1.1-9.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/logcheck-1.1.1-9.1.101mdk.src.rpm
Corporate Server 2.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/logcheck-1.1.1-9.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/logcheck-1.1.1-9.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/logcheck-1.1.1-9.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/logcheck-1.1.1-9.1.C21mdk.src.rpm

Standar resources

Property Value
CVE CAN-2004-0404
BID

Other resources

Debian Security Advisory DSA 488-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00088.html

Mandrakesoft Security Advisories MDKSA-2004:155
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:155

Version history

Version Comments Date
1.0 Aviso emitido 2004-04-19
1.1 Aviso emitido por Mandrake Linux (MDKSA-2004:155) 2004-12-23
Ministerio de Defensa
CNI
CCN
CCN-CERT