SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Firewall)  >   LutelWall Vendors:   firewall.lutel.pl
LutelWall Unsafe Temporary File Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1014112
SecurityTracker URL:  http://securitytracker.com/id/1014112
CVE Reference:   CVE-2005-1879   (Links to External Site)
Updated:  Jun 9 2005
Original Entry Date:  Jun 6 2005
Impact:   Modification of system information, Modification of user information

Version(s): 0.97 and prior versions
Description:   Eric Romang from ZATAZ Audit reported a vulnerability in LutelWall. A local user can gain elevated privileges.

The new_version_check() function creates a temporary file in an unsafe manner when updating to a new version. A local user can create a symbolic link (symlink) from a critical file on the system to the temporary file used by the system. Then, when the target root user runs the application to update the version, the symlinked file may be overwritten with the privileges of the target user.

The vendor was notified on May 22, 2005, without response.

The original advisory is available at:

http://www.zataz.net/adviso/lutelwall-05222005.txt

Impact:   A local user can gain root privileges.
Solution:   No solution was available at the time of this entry.
Vendor URL:  firewall.lutel.pl/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents

Subject:  LutelWall <= 0.97 insecure temporary file creation


#########################################################

LutelWall insecure temporary file creation

Vendor: http://firewall.lutel.pl/index.php
Advisory: http://www.zataz.net/adviso/lutelwall-05222005.txt
Vendor informed: yes
Exploit available: yes
Impact : medium
Exploitation : low

#########################################################

The vulnerability is caused due to temporary file being created insecurely.
This can be exploited via symlink attacks to create and overwrite 
arbitrary files
with the privileges of the user running the affected script.

The exploitation require that the root try to update the software.

##########
Versions:
##########

LutelWall <= 0.97

##########
Solution:
##########

non solution yet.

#########
Timeline:
#########

Discovered : 2005-05-22
Vendor notified : 2005-05-22
Vendor response : none
Vendor fix :  no fix
Disclosure : 2005-06-06

#####################
Technical details :
#####################

Vulnerable code :
-----------------

# Prefix of temporary firewall files
tmp='/tmp/lutelwall'

new_version_check () { # Check for new version of script

  if [ "`wget -V 2>&1 >/dev/null`" ]; then
   message 3 "Warrning: Wget is required to check for updates."
  else
   new_ver=`wget -C off -O - -q -t 1 -T 3 -w 3 -U "\`uname -a 2>&1\`" 
http://firewall.lutel.pl/ver`
   if [ `echo $current_version | gawk '{ gsub("\\\.","") ; print 1$0 }'` 
-lt `echo $new_ver | gawk '{ gsub("\\\.","") ; print 1$0 }'` ]; then
    echo -e "\nThere is newer version of LutelWall (${new_ver})"
    echo -n " Changes since previous version:"
    echo `wget -C off -O $tmp-newfeat -q -t 1 -T 3 -w 3 
http://firewall.lutel.pl/FEATURES-${new_ver}`
    cat $tmp-newfeat
    echo "Do you want to update [y/N]? "
    read -s -t 5 -n 1 ln
    if [ "$ln" = 'y' -o "$ln" = 'Y' ]; then
     wget -O $tmp-script -q -T 3 http://firewall.lutel.pl/lutelwall
     cat $tmp-script > $0
     rm -rf $tmp-script
     echo "Your firewall is up to date, exiting after update!"
     exit
    else
     message 5 "Update aborted"
    fi
   else
     message 5 "LutelWall is up-to-date"
   fi;
  fi;

}

#########
Related :
#########

nothing related

#####################
Credits :
#####################

Eric Romang (eromang@zataz.net - ZATAZ Audit)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC