[<prev] [next>] [day] [month] [year] [list]
Message-ID: <432ACFE5.1000006@zataz.net>
Date: Fri Sep 16 15:29:05 2005
From: exploits at zataz.net (ZATAZ Audits)
Subject: ncompress insecure temporary file creation
#########################################################
ncompress insecure temporary file creation
Vendor: ftp://ftp.leo.org/pub/comp/os/unix/linux/sunsite/utils/compress/
Advisory: http://www.zataz.net/adviso/ncompress-09052005.txt
Vendor informed: yes
Exploit available: yes
Impact : low
Exploitation : low
#########################################################
The vulnerability is caused due to temporary file being created insecurely.
This can be exploited via symlink attacks in combination with a race
condition to create and overwrite arbitrary files
with the privileges of the user running the affected script.
Secunia has reported that D1g1t4lLeech has discovered this bug
the 2005-09-16
ZATAZ Audit has discovered this bug the 2005-09-05
D1g1t4lLeech is a true Leecher :)
Gentoo Security take care on your IRC Channel, spy everywhere.
##########
Versions:
##########
ncompress <= 4.2.4-r1
##########
Solution:
##########
To prevent symlink attack use kernel patch such as grsecurity
#########
Timeline:
#########
Discovered : 2005-09-05
Vendor notified : 2005-09-05
Vendor response : no reponse
Vendor fix : no patch
Vendor Sec report (vendor-sec@....de) :
Disclosure :
#####################
Technical details :
#####################
ncompress use vulnerable version off zdiff and zcmp.
#########
Related :
#########
Secunia : http://secunia.com/advisories/13131/
CVE : CAN-2004-0970
#####################
Credits :
#####################
Eric Romang (eromang@...az.net - ZATAZ Audit)
Thxs to Gentoo Security Team. (Taviso, jaervosz, solar, Koon, etc.)
Powered by blists - more mailing lists