Bug 462326 (CVE-2008-4108)

Summary: CVE-2008-4108 python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: james.antill, kreilly
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-03-13 09:54:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jan Lieskovsky 2008-09-15 12:40:44 UTC
Description of problem:

A security flaw was discovered in the Python generic FAQ wizard moving
tool (move-faqwiz.sh). 


Relevant part of the code:

 28 cut_n_pad $1 2 suffix1
 29 cut_n_pad $2 1 prefix2
 30 cut_n_pad $2 2 suffix2
 31 tmpfile=tmp$RANDOM.tmp
 32 file1=faq$prefix1.$suffix1.htp
 33 file2=faq$prefix2.$suffix2.htp

Description:

An attacker could in advance create a symbolic link pointing to tmpXXXXX.tmp 
(the output produced by $RANDOM is only 5 digits long), then run the Python
generic FAQ wizard moving tool which would allow him to erase / truncate the target of the symbolic link to zero size.

References:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899

Comment 1 Jan Lieskovsky 2008-09-15 12:44:30 UTC
This issue affects all versions of the Python package, as shipped with
Red Hat Enteprise Linux 4, 5 and all versions of the Python package,
as shipped within Fedora releases of 8, 9 and 10.

Comment 8 Tomas Hoger 2009-03-13 09:54:51 UTC
(In reply to comment #1)
> This issue affects all versions of the Python package, as shipped with
> Red Hat Enteprise Linux 4, 5 and all versions of the Python package,
> as shipped within Fedora releases of 8, 9 and 10.  

Affected script is part of python source RPM for those Red Hat Enterprise Linux and Fedora versions, but it is not shipped in any binary RPM, hence there's nothing to fix.  Closing.