Bug 879582 (CVE-2012-5564) - CVE-2012-5564 android-tools (server): Insecure temporary file used for logging
Summary: CVE-2012-5564 android-tools (server): Insecure temporary file used for logging
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5564
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 879585 894745
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-23 11:37 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:58 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-10 21:35:22 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-11-23 11:37:44 UTC
An insecure temporary file use flaw was found in the way server component of android tools, a suite of Android Debug Bridge (ADB) platform tools, performed logging of server events upon server startup. A local attacker could use this flaw to conduct symbolic links attacks, possibly leading to their ability to append unauthorized content to system files accessible with the privileges of the user running the adb executable.

References:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688280

Comment 1 Jan Lieskovsky 2012-11-23 11:38:46 UTC
This issue affects the versions of the android-tools package, as shipped with Fedora release of 16 and 17. Please schedule an update (once there is final upstream patch available).

Comment 2 Jan Lieskovsky 2012-11-23 11:39:29 UTC
Created android-tools tracking bugs for this issue

Affects: fedora-all [bug 879585]

Comment 3 Jan Lieskovsky 2012-11-23 11:47:27 UTC
CVE Request:
  http://www.openwall.com/lists/oss-security/2012/11/23/1

Comment 4 Jan Lieskovsky 2012-11-27 11:10:23 UTC
The CVE identifier of CVE-2012-5564 has been assigned to this issue:
  http://www.openwall.com/lists/oss-security/2012/11/23/8


Note You need to log in before you can comment on or make changes to this bug.