Gnome Installer System Config-file Overwrite Vulnerability

BID:1596

Info

Gnome Installer System Config-file Overwrite Vulnerability

Bugtraq ID: 1596
Class: Race Condition Error
CVE: CVE-2000-0723
Remote: No
Local: Yes
Published: Aug 19 2000 12:00AM
Updated: Jul 11 2009 02:56AM
Credit: First posted to Bugtraq by Alan Cox <[email protected]> on August 19, 2000.
Vulnerable: Helix Code GNOME Installer 0.2
+ SCO eDesktop 2.4
+ SuSE Linux 6.4
+ SuSE Linux 6.3
Not Vulnerable: Helix Code GNOME Installer 0.6

Discussion

Gnome Installer System Config-file Overwrite Vulnerability

GNOME is a graphical user interface for X11 created by Helix Code. The installer, on Caldera eDesktop and S.u.S.E. linux systems use /tmp in an unsafe manner. It creates a directory in /tmp and stores temporary copies of system configuration files (/etc/config.d/bashrc, /etc/config.d/csh.cshrc, and /etc/rc.d/rc.gui files on Caldera OpenLinux eDesktop 2.4 and /etc/rc.config on SuSE 6.3 and 6.4) there before writing them to their proper locations. If a malicious user has knowledge that the administrator is going to be executing gnome-installer, he/she can cause the installer to write blank configuration files to the system (by making the directory before gnome installer does). This will result in the system losing part of its configuration.

Exploit / POC

Gnome Installer System Config-file Overwrite Vulnerability

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].

Solution / Fix

Gnome Installer System Config-file Overwrite Vulnerability


Helix Code GNOME Installer 0.2

References

Gnome Installer System Config-file Overwrite Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report