lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAONRaH6xfk9Fc=JE7XprV1bW=Jx-CoSEBLyBGgiBofyYCvbN9Q@mail.gmail.com>
Date: Sun, 4 Sep 2011 16:56:48 -0600
From: Bugs NotHugs <bugsnothugs@...il.com>
To: fd <full-disclosure@...ts.grok.org.uk>, bugtraq <bugtraq@...urityfocus.com>,
	vuldb@...urityfocus.com, vuln@...unia.com, 
	submissions@...ketstormsecurity.org, xforce@....net, Vuln@...irt.com, 
	timb@...nvas.org
Subject: openvas 2.x race condition

> openvas-server/openvas/oval_plugins.c
> [...]
> results_filename = "/tmp/results.xml";
> if (g_file_test (results_filename, G_FILE_TEST_EXISTS))
>    {
>      log_write ("Found existing results file in %s, deleting it to
> avoid conflicts.", results_filename);

it unlink /tmp/results.xml avoid symlink attack then spawn process
that write stuff to /tmp/results.xml

chinese apt can make symlink point to any system file during race and win race!

-- 

BugsNotHugs
Shared Vulnerability Disclosure Account

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ