Uso inseguro de directorio temporal en logcheck
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Ocultacion del rastro |
Dificulty |
Experto |
Required attacker level |
Acceso remoto con cuenta |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
Logcheck <1.1.1 |
Description
|
Se ha descubierto una vulnerabilidad en logcheck. La explotación de esta vulnerabilidad podría permitir a un usuario local sobrescribir archivos con privilegios de root.
Logcheck utiliza un directorio temporal en /var/tmp sin tomar medidas de seguridad. Mientras este directorio sea creado cuando logcheck es instalado y mientras exista el directorio, el paquete no es vulnerable. Sin embargo, si en algún momento este directorio es eliminado el paquete es vulnerable. |
Solution
|
Actualización de software
Debian Linux
Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.dsc
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.diff.gz
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1.orig.tar.gz
Paquetes independientes de arquitectura
http://security.debian.org/pool/updates/main/l/logcheck/logcheck-database_1.1.1-13.1woody1_all.deb
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1_all.deb
http://security.debian.org/pool/updates/main/l/logcheck/logtail_1.1.1-13.1woody1_all.deb
Mandrake Linux
Mandrake Linux 9.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/logcheck-1.1.1-9.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/logcheck-1.1.1-9.1.92mdk.src.rpm
Mandrake Linux 9.2/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/logcheck-1.1.1-9.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/logcheck-1.1.1-9.1.92mdk.src.rpm
Mandrake Linux 10.0
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/logcheck-1.1.1-9.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/logcheck-1.1.1-9.1.100mdk.src.rpm
Mandrake Linux 10.0/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/logcheck-1.1.1-9.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/logcheck-1.1.1-9.1.100mdk.src.rpm
Mandrake Linux 10.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/logcheck-1.1.1-9.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/logcheck-1.1.1-9.1.101mdk.src.rpm
Mandrake Linux 10.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/logcheck-1.1.1-9.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/logcheck-1.1.1-9.1.101mdk.src.rpm
Corporate Server 2.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/logcheck-1.1.1-9.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/logcheck-1.1.1-9.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/logcheck-1.1.1-9.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/logcheck-1.1.1-9.1.C21mdk.src.rpm |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0404 |
BID |
NULL |
Other resources
|
Debian Security Advisory DSA 488-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00088.html
Mandrakesoft Security Advisories MDKSA-2004:155
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:155 |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2004-04-19
|
1.1
|
Aviso emitido por Mandrake Linux (MDKSA-2004:155)
|
2004-12-23
|