Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Texinfo Vendors:   GNU [multiple authors]
Texinfo 'texindex' Unsafe Temporary File May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1014992
SecurityTracker URL:
CVE Reference:   CVE-2005-3011   (Links to External Site)
Updated:  Jun 4 2008
Original Entry Date:  Sep 30 2005
Impact:   Modification of system information, Modification of user information, User access via local system

Description:   A vulnerability was reported in Texinfo. A local user may be able to gain elevated privileges.

The texindex command uses temporary files in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to a predictably named temporary file to be used by texindex. Then, when texindex is run, the symlinked file will be created or overwritten with the privileges of the texindex process.

The software only creates these temporary files when processing a file with more than 50,000 lines.

The vulnerability resides in the maketempname() function.

Frank Lichtenheld discovered this vulnerability.

Impact:   A local user can gain elevated privileges on the target system.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC