Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   3ddiag Vendors:   SuSE
SuSE 3ddiag Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1008804
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 21 2004
Impact:   Modification of system information, Root access via local system, User access via local system
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in SuSE's 3ddiag configuration verification tool. A local user may be able to obtain elevated privileges.

SuSE reported that some 3ddiag scripts process temporary files in an unsafe manner. A local user may be able to create a symbolic link (symlink) from a critical file on the system to a likely temporary file name. Then, when the 3ddiag script is run, the symlinked file may be modified or overwritten with the privileges of the 3ddiag script process.

SuSE credits Stefan Nordhausen with reporting some of the issues.

Impact:   A local user may be able to obtain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry. SuSE is planning to issue fixed packages shortly.
Vendor URL: (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (SuSE)

Message History:   None.

 Source Message Contents

Subject:  3ddiag

In SuSE-SA:2004:003 SuSE reported:

 > 3ddiag
 >     Some 3ddiag scripts handle temporary files in an insecure manner.
 >     Thanks to Stefan Nordhausen <nordhaus at>
 >     for reporting some of the issues.
 >     New packages will be available on our FTP servers soon.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC