|
|
|
<?xml version="1.0" encoding="utf-8"?>
|
|
|
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
|
|
|
<glsa id="200411-15">
|
|
|
|
<title>OpenSSL, Groff: Insecure tempfile handling</title>
|
|
|
|
<synopsis>
|
|
|
|
groffer, included in the Groff package, and the der_chop script, included
|
|
|
|
in the OpenSSL package, are both vulnerable to symlink attacks, potentially
|
|
|
|
allowing a local user to overwrite arbitrary files with the rights of the
|
|
|
|
user running the utility.
|
|
|
|
</synopsis>
|
|
|
|
<product type="ebuild">OpenSSL</product>
|
|
|
|
<announced>2004-11-08</announced>
|
|
|
|
<revised count="02">2006-08-23</revised>
|
|
|
|
<bug>68404</bug>
|
|
|
|
<bug>68407</bug>
|
|
|
|
<access>local</access>
|
|
|
|
<affected>
|
|
|
|
<package name="dev-libs/openssl" auto="yes" arch="*">
|
|
|
|
<unaffected range="ge">0.9.7d-r2</unaffected>
|
|
|
|
<vulnerable range="lt">0.9.7d-r2</vulnerable>
|
|
|
|
</package>
|
|
|
|
<package name="sys-apps/groff" auto="yes" arch="*">
|
|
|
|
<unaffected range="ge">1.19.1-r2</unaffected>
|
|
|
|
<unaffected range="rge">1.18.1.1</unaffected>
|
|
|
|
<vulnerable range="lt">1.19.1-r2</vulnerable>
|
|
|
|
</package>
|
|
|
|
</affected>
|
|
|
|
<background>
|
|
|
|
<p>
|
|
|
|
OpenSSL is a toolkit implementing the Secure Sockets Layer and
|
|
|
|
Transport Layer Security protocols as well as a general-purpose
|
|
|
|
cryptography library. It includes the der_chop script, which is used to
|
|
|
|
convert DER-encoded certificates to PEM format. Groff (GNU Troff) is a
|
|
|
|
typesetting package which reads plain text mixed with formatting
|
|
|
|
commands and produces formatted output. It includes groffer, a command
|
|
|
|
used to display groff files and man pages on X and tty.
|
|
|
|
</p>
|
|
|
|
</background>
|
|
|
|
<description>
|
|
|
|
<p>
|
|
|
|
groffer and the der_chop script create temporary files in
|
|
|
|
world-writeable directories with predictable names.
|
|
|
|
</p>
|
|
|
|
</description>
|
|
|
|
<impact type="normal">
|
|
|
|
<p>
|
|
|
|
A local attacker could create symbolic links in the temporary files
|
|
|
|
directory, pointing to a valid file somewhere on the filesystem. When
|
|
|
|
groffer or der_chop is executed, this would result in the file being
|
|
|
|
overwritten with the rights of the user running the utility, which
|
|
|
|
could be the root user.
|
|
|
|
</p>
|
|
|
|
</impact>
|
|
|
|
<workaround>
|
|
|
|
<p>
|
|
|
|
There is no known workaround at this time.
|
|
|
|
</p>
|
|
|
|
</workaround>
|
|
|
|
<resolution>
|
|
|
|
<p>
|
|
|
|
All Groff users should upgrade to the latest version:
|
|
|
|
</p>
|
|
|
|
<code>
|
|
|
|
# emerge --sync
|
|
|
|
# emerge --ask --oneshot --verbose sys-apps/groff</code>
|
|
|
|
<p>
|
|
|
|
All OpenSSL users should upgrade to the latest version:
|
|
|
|
</p>
|
|
|
|
<code>
|
|
|
|
# emerge --sync
|
|
|
|
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7d-r2"</code>
|
|
|
|
<p>
|
|
|
|
Note: /etc/ssl/misc/der_chop is protected by Portage as a configuration
|
|
|
|
file. Don't forget to use etc-update and overwrite the old version with
|
|
|
|
the new one.
|
|
|
|
</p>
|
|
|
|
</resolution>
|
|
|
|
<references>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969">CAN-2004-0969</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975">CAN-2004-0975</uri>
|
|
|
|
</references>
|
|
|
|
<metadata tag="submitter" timestamp="2004-11-07T18:43:48Z">
|
|
|
|
koon
|
|
|
|
</metadata>
|
|
|
|
<metadata tag="bugReady" timestamp="2004-11-07T18:44:31Z">
|
|
|
|
koon
|
|
|
|
</metadata>
|
|
|
|
</glsa>
|