lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100403060929.GA2347@truecrux.org>
Date: Sat, 3 Apr 2010 10:09:29 +0400
From: Vladimir Lettiev <thecrux@...il.com>
To: bugs lists <bugs@....dhs.org>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: FileCache: tmp file permission vulnerability.

On Thu, Apr 01, 2010 at 11:30:50PM -0400, bugs lists wrote:
> 
> 
> FileCache: tmp file permission vulnerability.
> Larry W. Cashdollar
> Vapid Labs http://vapid.dhs.org
> 2/16/2010
> 
> Perl Cache-Cache-1.06 is a memory and file caching module for perl. It
> stores its default file cache in /tmp with world read/write permissions. A
> local attacker can use this cache to glean information from applications
> using module. Regardless of weather the transaction is taking place over an
> encrypted SSL session.

This is documented behaviour. You can override insecure default cache root and
umask with options 'cache_root' and 'directory_umask':

use Cache::FileCache;
use File::Temp qw/ tempdir /;
my $cache = new Cache::FileCache( {
    'cache_root' => tempdir('CacheXXXXX'),
    'directory_umask' => 077,
} );

-- 
Vladimir Lettiev aka crux <theCrux@...il.com>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ