blob: f88fc0a04503e2a411dd7f9713976c06b0095950 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200410-02">
<title>Netpbm: Multiple temporary file issues</title>
<synopsis>
Utilities included in old Netpbm versions are vulnerable to multiple
temporary files issues, potentially allowing a local attacker to overwrite
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">Netpbm</product>
<announced>2004-10-04</announced>
<revised>2004-10-04: 01</revised>
<bug>65647</bug>
<access>local</access>
<affected>
<package name="media-libs/netpbm" auto="yes" arch="*">
<unaffected range="ge">10.0</unaffected>
<vulnerable range="le">9.12-r4</vulnerable>
</package>
</affected>
<background>
<p>
Netpbm is a toolkit containing more than 200 separate utilities for
manipulation and conversion of graphic images.
</p>
</background>
<description>
<p>
Utilities contained in the Netpbm package prior to the 9.25 version contain
defects in temporary file handling. They create temporary files with
predictable names without checking first that the target file doesn't
already exist.
</p>
</description>
<impact type="normal">
<p>
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When a
user or a tool calls one of the affected utilities, this would result in
file overwriting with the rights of the user running the utility.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All Netpbm users should upgrade to an unaffected version:
</p>
<code>
# emerge sync
# emerge -pv ">=media-libs/netpbm-10.0"
# emerge ">=media-libs/netpbm-10.0"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924">CVE-2003-0924</uri>
<uri link="https://www.kb.cert.org/vuls/id/487102">US-CERT VU#487102</uri>
</references>
<metadata tag="requester" timestamp="2004-10-02T00:18:31Z">
lewk
</metadata>
<metadata tag="bugReady" timestamp="2004-10-03T10:07:45Z">
koon
</metadata>
<metadata tag="submitter" timestamp="2004-10-03T13:46:27Z">
koon
</metadata>
</glsa>
|