Bug 473310 - tiger: Insecure usage of temporary files
tiger: Insecure usage of temporary files
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
public=20080824,reported=20081126,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-11-27 11:35 EST by Jan Lieskovsky
Modified: 2010-03-22 11:45 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-03-22 11:45:31 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2008-11-27 11:35:46 EST
Description of problem:

The tiger package, as shipped with Fedora releases of 8, 9 and devel is
prone to the symlink attack due to insecure usage of temporary files.

Affected file: /usr/lib/tiger/util/genmsgidx

Relevant part of the code:

     72 TESTEXEC=-x
     73 ( [ $TESTEXEC /bin/sh ] ) 2> /tmp/te.$$
     74 [ -s /tmp/te.$$ ] && TESTEXEC=-f
     75 export TESTEXEC
     76 
     77 RM=`findcmd rm`
     78 [ -n "$RM" ] && $RM /tmp/te.$$


Description of problem:

A malicious user could precreate a symlink pointing to the file
/tmp/te.pid_number. Subsequent run of the tiger tool would
allow him to destroy / truncate the size of the symlink target to zero.

Note You need to log in before you can comment on or make changes to this bug.