oss-sec mailing list archives

Re: CVE id rquest: xfig insecure tmp files


From: "Steven M. Christey" <coley () linus mitre org>
Date: Sat, 6 Jun 2009 13:41:43 -0400 (EDT)


Not sure of the version because it's not stated in the original request
and the Xfig changelog doesn't list any security issues.


======================================================
Name: CVE-2009-1962
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1962
Reference: MLIST:[oss-security] 20090401 CVE id rquest: xfig insecure tmp files
Reference: URL:http://www.openwall.com/lists/oss-security/2009/04/01/6
Reference: BID:34328
Reference: URL:http://www.securityfocus.com/bid/34328
Reference: XF:xfig-temp-symlink(49600)
Reference: URL:http://xforce.iss.net/xforce/xfdb/49600

Xfig in Debian GNU/Linux, possibly 3.2.5, allows local users to read
and write arbitrary files via a symlink attack on the (1)
xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4)
xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7)
xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10)
xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID]
is a process ID.



Current thread: