LutelWall Unsafe Temporary File Lets Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1014112 |
SecurityTracker URL: http://securitytracker.com/id/1014112
|
CVE Reference:
CVE-2005-1879
(Links to External Site)
|
Updated: Jun 9 2005
|
Original Entry Date: Jun 6 2005
|
Impact:
Modification of system information, Modification of user information
|
|
Version(s): 0.97 and prior versions
|
Description:
Eric Romang from ZATAZ Audit reported a vulnerability in LutelWall. A local user can gain elevated privileges.
The new_version_check() function creates a temporary file in an unsafe manner when updating to a new version. A local user can create a symbolic link (symlink) from a critical file on the system to the temporary file used by the system. Then, when the target root user runs the application to update the version, the symlinked file may be overwritten with the privileges of the target user.
The vendor was notified on May 22, 2005, without response.
The original advisory is available at:
http://www.zataz.net/adviso/lutelwall-05222005.txt
|
Impact:
A local user can gain root privileges.
|
Solution:
No solution was available at the time of this entry.
|
Vendor URL: firewall.lutel.pl/ (Links to External Site)
|
Cause:
Access control error, State error
|
Underlying OS: Linux (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: LutelWall <= 0.97 insecure temporary file creation
|
#########################################################
LutelWall insecure temporary file creation
Vendor: http://firewall.lutel.pl/index.php
Advisory: http://www.zataz.net/adviso/lutelwall-05222005.txt
Vendor informed: yes
Exploit available: yes
Impact : medium
Exploitation : low
#########################################################
The vulnerability is caused due to temporary file being created insecurely.
This can be exploited via symlink attacks to create and overwrite
arbitrary files
with the privileges of the user running the affected script.
The exploitation require that the root try to update the software.
##########
Versions:
##########
LutelWall <= 0.97
##########
Solution:
##########
non solution yet.
#########
Timeline:
#########
Discovered : 2005-05-22
Vendor notified : 2005-05-22
Vendor response : none
Vendor fix : no fix
Disclosure : 2005-06-06
#####################
Technical details :
#####################
Vulnerable code :
-----------------
# Prefix of temporary firewall files
tmp='/tmp/lutelwall'
new_version_check () { # Check for new version of script
if [ "`wget -V 2>&1 >/dev/null`" ]; then
message 3 "Warrning: Wget is required to check for updates."
else
new_ver=`wget -C off -O - -q -t 1 -T 3 -w 3 -U "\`uname -a 2>&1\`"
http://firewall.lutel.pl/ver`
if [ `echo $current_version | gawk '{ gsub("\\\.","") ; print 1$0 }'`
-lt `echo $new_ver | gawk '{ gsub("\\\.","") ; print 1$0 }'` ]; then
echo -e "\nThere is newer version of LutelWall (${new_ver})"
echo -n " Changes since previous version:"
echo `wget -C off -O $tmp-newfeat -q -t 1 -T 3 -w 3
http://firewall.lutel.pl/FEATURES-${new_ver}`
cat $tmp-newfeat
echo "Do you want to update [y/N]? "
read -s -t 5 -n 1 ln
if [ "$ln" = 'y' -o "$ln" = 'Y' ]; then
wget -O $tmp-script -q -T 3 http://firewall.lutel.pl/lutelwall
cat $tmp-script > $0
rm -rf $tmp-script
echo "Your firewall is up to date, exiting after update!"
exit
else
message 5 "Update aborted"
fi
else
message 5 "LutelWall is up-to-date"
fi;
fi;
}
#########
Related :
#########
nothing related
#####################
Credits :
#####################
Eric Romang (eromang@zataz.net - ZATAZ Audit)
|
|