GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
BID:12981
Info
GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
| Bugtraq ID: | 12981 |
| Class: | Design Error |
| CVE: |
CVE-2005-0990 |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 04 2005 12:00AM |
| Updated: | Feb 21 2007 10:56PM |
| Credit: | Joey Hess is credited with the discovery of this issue. |
| Vulnerable: |
SGI ProPack 3.0 Redhat Linux 9.0 i386 Redhat Linux 7.3 i686 Redhat Linux 7.3 i386 Redhat Linux 7.3 Redhat Fedora Core2 Redhat Fedora Core1 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux WS 3 Redhat Enterprise Linux WS 2.1 IA64 Redhat Enterprise Linux WS 2.1 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux ES 3 Redhat Enterprise Linux ES 2.1 IA64 Redhat Enterprise Linux ES 2.1 Redhat Enterprise Linux AS 4 Redhat Enterprise Linux AS 3 Redhat Enterprise Linux AS 2.1 IA64 Redhat Enterprise Linux AS 2.1 Redhat Desktop 4.0 Redhat Desktop 3.0 Redhat Advanced Workstation for the Itanium Processor 2.1 IA64 Redhat Advanced Workstation for the Itanium Processor 2.1 GNU sharutils 4.2.1 GNU sharutils 4.2 Avaya S8710 R2.0.1 Avaya S8710 R2.0.0 Avaya S8700 R2.0.1 Avaya S8700 R2.0.0 Avaya S8500 R2.0.1 Avaya S8500 R2.0.0 Avaya S8300 R2.0.1 Avaya S8300 R2.0.0 Avaya Modular Messaging (MSS) 2.0 Avaya Modular Messaging (MSS) 1.1 Avaya MN100 Avaya Intuity LX Avaya Converged Communications Server 2.0 |
| Not Vulnerable: | |
Discussion
GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
The GNU Sharutils 'unshar' utility creates temporary files in an insecure manner. A design error allows a file to be insecurely opened or created and subsequently written to.
A local attacker may leverage this issue to corrupt arbitrary files with the privileges of an unsuspecting user that activates the affected application.
The GNU Sharutils 'unshar' utility creates temporary files in an insecure manner. A design error allows a file to be insecurely opened or created and subsequently written to.
A local attacker may leverage this issue to corrupt arbitrary files with the privileges of an unsuspecting user that activates the affected application.
Exploit / POC
GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
No exploit is required to leverage this issue.
No exploit is required to leverage this issue.
Solution / Fix
GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
Solution:
Please see referenced advisories for more information.
GNU sharutils 4.2.1
Solution:
Please see referenced advisories for more information.
GNU sharutils 4.2.1
-
Mandrake sharutils-4.2.1-14.1.100mdk.amd64.rpm
Mandrake Linux 10.0/AMD64
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-14.1.100mdk.i586.rpm
Mandrake Linux 10.0
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-14.1.C21mdk.i586.rpm
Mandrake Corporate Server 2.1
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-14.1.C21mdk.x86_64.rpm
Mandrake Corporate Server 2.1/x86_64
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-14.1.C30mdk.i586.rpm
Mandrake Corporate Server 3.0
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-14.1.C30mdk.x86_64.rpm
Mandrake Corporate Server 3.0/x86_64
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-17.1.101mdk.i586.rpm
Mandrake Linux 10.1
http://www.mandrakesecure.net/en/ftp.php -
Mandrake sharutils-4.2.1-17.1.101mdk.x86_64.rpm
Mandrake Linux 10.1/x86_64
http://www.mandrakesecure.net/en/ftp.php -
RedHat sharutils-4.2.1-12.8.legacy.i386.rpm
RedHat Linux 7.3
http://download.fedoralegacy.org/redhat/7.3/updates/i386/sharutils-4.2 .1-12.8.legacy.i386.rpm -
RedHat sharutils-4.2.1-16.9.2.legacy.i386.rpm
RedHat Linux 9.0
http://download.fedoralegacy.org/redhat/9/updates/i386/sharutils-4.2.1 -16.9.2.legacy.i386.rpm -
RedHat sharutils-4.2.1-17.3.legacy.i386.rpm
RedHat Fedora Core 1
http://download.fedoralegacy.org/fedora/1/updates/i386/sharutils-4.2.1 -17.3.legacy.i386.rpm -
RedHat sharutils-4.2.1-18.3.FC2.legacy.i386.rpm
RedHat Fedora Core 2
http://download.fedoralegacy.org/fedora/2/updates/i386/sharutils-4.2.1 -18.3.FC2.legacy.i386.rpm -
RedHat Fedora sharutils-4.2.1-22.2.FC3.i386.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386 /sharutils-4.2.1-22.2.FC3.i386.rpm -
RedHat Fedora sharutils-4.2.1-22.2.FC3.x86_64.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_ 64/sharutils-4.2.1-22.2.FC3.x86_64.rpm -
RedHat Fedora sharutils-debuginfo-4.2.1-22.2.FC3.i386.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386 /debug/sharutils-debuginfo-4.2.1-22.2.FC3.i386.rpm -
RedHat Fedora sharutils-debuginfo-4.2.1-22.2.FC3.x86_64.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_ 64/debug/sharutils-debuginfo-4.2.1-22.2.FC3.x86_64.rpm -
Ubuntu sharutils-doc_4.2.1-10ubuntu0.2_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils-doc_ 4.2.1-10ubuntu0.2_all.deb -
Ubuntu sharutils_4.2.1-10ubuntu0.2_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2. 1-10ubuntu0.2_amd64.deb -
Ubuntu sharutils_4.2.1-10ubuntu0.2_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2. 1-10ubuntu0.2_i386.deb -
Ubuntu sharutils_4.2.1-10ubuntu0.2_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2. 1-10ubuntu0.2_powerpc.deb
References
GNU Sharutils Unshar Local Insecure Temporary File Creation Vulnerability
References:
References:
- ASA-2005-135 - sharutils (Avaya)
- GNU Sharutils Home Page (GNU)
- RHSA-2005:377-07 - sharutils security update (Red Hat)