SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
(Red Hat Issues Fix) Perl DBI::ProxyServer Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1013212
SecurityTracker URL:  http://securitytracker.com/id/1013212
CVE Reference:   CVE-2005-0077   (Links to External Site)
Date:  Feb 16 2005
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Perl DBI library in the use of temporary files. A local user may be able to gain elevated privileges.

The 'DBI::ProxyServer' module in the Perl DBI library uses a process ID (PID) file in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to the PID file used by the library. Then, when a target user invokes an application that uses the module (such as 'dbiproxy'), the symlinked file may be created or overwritten with the privileges of the target user.

The flaws reside in 'dbiproxy.PL' and 'lib/DBI/ProxyServer.pm'.

Javier Fernandez-Sanguino Pena from the Debian Security Audit Project is credited with discovering this flaw.

Impact:   A local user may be able to gain elevated privileges.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

ppc:
a9a28fb845faf483e66253830c095cc9 perl-DBI-1.40-8.ppc.rpm

s390:
1574b5f38084c6a0bde8a7c8c83ccb0c perl-DBI-1.40-8.s390.rpm

s390x:
04b4f82b9627867ce69f796512fa0fb8 perl-DBI-1.40-8.s390x.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Cause:   Access control error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Jan 26 2005 Perl DBI::ProxyServer Unsafe Temporary Files May Let Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2005:072-01] Low: perl-DBI security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: perl-DBI security update
Advisory ID:       RHSA-2005:072-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-072.html
Issue date:        2005-02-15
Updated on:        2005-02-15
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0077
- ---------------------------------------------------------------------

1. Summary:

An updated perl-DBI package that fixes a temporary file flaw in
DBI::ProxyServer is now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

DBI is a database access Application Programming Interface (API) for
the Perl programming language. 

The Debian Security Audit Project discovered that the DBI library creates a
temporary PID file in an insecure manner.  A local user could overwrite or
create files as a different user who happens to run an application which
uses DBI::ProxyServer.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0077 to this issue. 

Users should update to this erratum package which disables the temporary
PID file unless configured.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145577 - CAN-2005-0077 perl-DBI insecure temporary file usage

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

ppc:
a9a28fb845faf483e66253830c095cc9  perl-DBI-1.40-8.ppc.rpm

s390:
1574b5f38084c6a0bde8a7c8c83ccb0c  perl-DBI-1.40-8.s390.rpm

s390x:
04b4f82b9627867ce69f796512fa0fb8  perl-DBI-1.40-8.s390x.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCEcyLXlSAg2UNWIIRAq2FAJ9yf/DpAmcZmlng1VJwJbv5HQ2WmQCfY05U
n99EtzgTEtMrOxYkaGqnayM=
=Gnmg
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC