An insecure temporary file use flaw was found in the way qmailscan (plug-in to graph output from qmailscan and clamav) plug-in of the Munin, a network-wide graphing framework performed scan of qmailscan log files for presence of disallowed characters. A local attacker could use this flaw to conduct symbolic link attacks (possibly leading to attacker's ability to overwrite or remove arbitrary files, belonging to the user, running the Munin qmailscan log files scannning). References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668778
This issue affects [*] the versions of the Munin package, as shipped with Fedora release of 15 and 16. Please schedule an update once final upstream patch is available. -- This issue affects [*] the versions of the Munin package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update once final upstream patch is available. [*] We doesn't seem to ship Qmail package in Fedora / Fedora EPEL, thus not sure, how much widely Munin's qmailscan plug-in might be used there (but since Clamav Antivirus is shipped, assuming it would be possible to reach / exploit this via qmailscan plug-in).
Created munin tracking bugs for this issue Affects: fedora-all [bug 812893] Affects: epel-all [bug 812894]
CVE Request: [2] http://www.openwall.com/lists/oss-security/2012/04/16/5
Added CVE as per http://www.openwall.com/lists/oss-security/2012/04/16/6