Bug 409871 (CVE-2007-6209)

Summary: CVE-2007-6209 zsh insecure /tmp file usage
Product: [Other] Security Response Reporter: Lubomir Kundrak <lkundrak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: james.antill
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6209
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-12-04 08:44:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Lubomir Kundrak 2007-12-04 08:38:22 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6209 to the following vulnerability:

difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.

References:

http://www.zsh.org/mla/workers/2007/msg01060.html
http://www.zsh.org/mla/workers/2007/msg01065.html
http://www.zsh.org/mla/workers/2007/msg01066.html
https://bugs.gentoo.org/show_bug.cgi?id=201022

Comment 1 Lubomir Kundrak 2007-12-04 08:43:43 UTC
Not vulnerable. These issues did not affect the versions of the zsh package as
shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

Comment 2 James Antill 2007-12-04 13:22:17 UTC
 It's worth noting that even the 4.3.4 version of zsh we ship in Fedora is also
not vulnerable, as we don't ship that perl script (looks like an addon).