oss-sec mailing list archives
Re: CVE id rquest: xfig insecure tmp files
From: "Steven M. Christey" <coley () linus mitre org>
Date: Sat, 6 Jun 2009 13:41:43 -0400 (EDT)
Not sure of the version because it's not stated in the original request and the Xfig changelog doesn't list any security issues. ====================================================== Name: CVE-2009-1962 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1962 Reference: MLIST:[oss-security] 20090401 CVE id rquest: xfig insecure tmp files Reference: URL:http://www.openwall.com/lists/oss-security/2009/04/01/6 Reference: BID:34328 Reference: URL:http://www.securityfocus.com/bid/34328 Reference: XF:xfig-temp-symlink(49600) Reference: URL:http://xforce.iss.net/xforce/xfdb/49600 Xfig in Debian GNU/Linux, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.
Current thread:
- CVE id rquest: xfig insecure tmp files Nico Golde (Apr 01)
- Re: CVE id rquest: xfig insecure tmp files Steven M. Christey (Jun 06)