Bug 462326 (CVE-2008-4108) - CVE-2008-4108 python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
Summary: CVE-2008-4108 python: Generic FAQ wizard moving tool insecure auxiliary /tmp ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2008-4108
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: reported=20080915,public=20080914,sou...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-09-15 12:40 UTC by Jan Lieskovsky
Modified: 2019-06-08 12:35 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-03-13 09:54:51 UTC


Attachments (Terms of Use)

Description Jan Lieskovsky 2008-09-15 12:40:44 UTC
Description of problem:

A security flaw was discovered in the Python generic FAQ wizard moving
tool (move-faqwiz.sh). 


Relevant part of the code:

 28 cut_n_pad $1 2 suffix1
 29 cut_n_pad $2 1 prefix2
 30 cut_n_pad $2 2 suffix2
 31 tmpfile=tmp$RANDOM.tmp
 32 file1=faq$prefix1.$suffix1.htp
 33 file2=faq$prefix2.$suffix2.htp

Description:

An attacker could in advance create a symbolic link pointing to tmpXXXXX.tmp 
(the output produced by $RANDOM is only 5 digits long), then run the Python
generic FAQ wizard moving tool which would allow him to erase / truncate the target of the symbolic link to zero size.

References:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899

Comment 1 Jan Lieskovsky 2008-09-15 12:44:30 UTC
This issue affects all versions of the Python package, as shipped with
Red Hat Enteprise Linux 4, 5 and all versions of the Python package,
as shipped within Fedora releases of 8, 9 and 10.

Comment 8 Tomas Hoger 2009-03-13 09:54:51 UTC
(In reply to comment #1)
> This issue affects all versions of the Python package, as shipped with
> Red Hat Enteprise Linux 4, 5 and all versions of the Python package,
> as shipped within Fedora releases of 8, 9 and 10.  

Affected script is part of python source RPM for those Red Hat Enterprise Linux and Fedora versions, but it is not shipped in any binary RPM, hence there's nothing to fix.  Closing.


Note You need to log in before you can comment on or make changes to this bug.