Bug 467387 (CVE-2008-4580) - CVE-2008-4580 cman/fence: insecure temporary file usage in the manual fence agent
Summary: CVE-2008-4580 cman/fence: insecure temporary file usage in the manual fence a...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2008-4580
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On: 469338
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-10-17 09:21 UTC by Tomas Hoger
Modified: 2021-11-12 19:53 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-11-12 16:27:24 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2008-10-17 09:21:00 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-4580 to the following vulnerability:

fence_manual in fence allows local users to modify arbitrary files via
a symlink attack on the fence_manual.fifo temporary file.

References:
http://www.openwall.com/lists/oss-security/2008/10/13/3

Comment 1 Tomas Hoger 2008-10-17 09:22:31 UTC
Issue affects fence packages in the Red Hat Cluster Suite for Red Hat
Enterprise Linux 4, and cman packages in the Red Hat Enterprise Linux 5.

Current git version of manual fencing agent is no longer affected, no fifo communication is used any more:
http://git.fedorahosted.org/git/cluster.git?p=cluster.git;a=tree;f=fence/agents;hb=HEAD

Comment 2 Fabio Massimo Di Nitto 2008-10-17 11:55:04 UTC
FYI this bug does not affect F9 or cluster-2.03 releases.

Fabio

Comment 5 Tomas Hoger 2009-11-12 16:27:24 UTC
Manual fencing agent is documented as being provided for testing purposed only and should not be used in production environments.  Therefore, there's no plan to fix this flaw in Red Hat Enterprise Linux 4 and 5 and will only be addressed in future product versions.


Note You need to log in before you can comment on or make changes to this bug.