lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1306709248.10410.4.camel@b0x> Date: Sun, 29 May 2011 18:47:28 -0400 From: magikh0e <magikh0e@...b.org> To: full-disclosure@...ts.grok.org.uk Subject: Vulnerability in FortiClient SSL VPN - Linux forticlientsslvpn suffers from an insecure lock file creation issue. Upon starting the forticlientsslvpn, the file 'forticlientsslvpn.lock' is created under the /tmp directory with octal permissions 0666. The client does not first check if this file exists, or if it is even currently owned by the user running the client. P.O.C Create a symlink from /tmp/forticlientsslvpn.lock to /some/file/owned_by_root as a non-root user. Then run the forticlientsslvpn client as root and the file you pointed at will then be overwritten upon execution. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists