[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: policyd-weight insecure temporary
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-03-31 22:00:16
Message-ID: Pine.GSO.4.51.0803311759500.16237 () faron ! mitre ! org
[Download RAW message or body]


Two separate CVEs - one for the original problem, one for the insufficient
patch.

- Steve


======================================================
Name: CVE-2008-1569
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1569
Reference: CONFIRM:http://www.policyd-weight.org/
Reference: CONFIRM:https://bugs.gentoo.org/show_bug.cgi?id=214403
Reference: DEBIAN:DSA-1531
Reference: URL:http://www.debian.org/security/2008/dsa-1531
Reference: BID:28480
Reference: URL:http://www.securityfocus.com/bid/28480
Reference: SECUNIA:29553
Reference: URL:http://secunia.com/advisories/29553

policyd-weight before 0.1.14 beta-16 allows local users to modify or
delete arbitrary files via a symlink attack on temporary files that
are used when creating a socket.


======================================================
Name: CVE-2008-1570
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1570
Reference: CONFIRM:https://bugs.gentoo.org/show_bug.cgi?id=214403

Race condition in the create_lockpath function in policyd-weight
0.1.14 beta-16 allows local users to modify or delete arbitrary files
by creating the LOCKPATH directory, then modifying it after the
symbolic link check occurs.  NOTE: this is due to an incomplete fix
for CVE-2008-1569.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic