Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
BID:2213
Info
Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
| Bugtraq ID: | 2213 |
| Class: | Race Condition Error |
| CVE: |
CVE-2001-0132 |
| Remote: | No |
| Local: | Yes |
| Published: | Jan 14 2001 12:00AM |
| Updated: | Jul 11 2009 04:46AM |
| Credit: | Reported to bugtraq by Joey Maier <[email protected]> on Sun, 14 Jan 2001 |
| Vulnerable: |
Trend Micro InterScan VirusWall for Unix 3.6 x Trend Micro InterScan VirusWall for Unix 3.0.1 |
| Not Vulnerable: | |
Discussion
Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
Interscan VirusWall creates temporary files in the world-writeable /tmp directory with predictable filenames. It is possible for a malicious user to create symbolic links in /tmp with guessed/predicted filenames, knowing in advance that Interscan VirusWall will be run by root. When this happens, the files pointed to by the correctly guessed symbolic links will be overwritten by VirusWall (as root). If the attacker is able to control the data being written to these temporary files by VirusWall, it is possible to obtain root privilege.
Interscan VirusWall creates temporary files in the world-writeable /tmp directory with predictable filenames. It is possible for a malicious user to create symbolic links in /tmp with guessed/predicted filenames, knowing in advance that Interscan VirusWall will be run by root. When this happens, the files pointed to by the correctly guessed symbolic links will be overwritten by VirusWall (as root). If the attacker is able to control the data being written to these temporary files by VirusWall, it is possible to obtain root privilege.
Exploit / POC
Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
Currently the SecurityFocus staff are not aware of any publicly available exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any publicly available exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
Trend Micro Interscan VirusWall Symlink Root Compromise Vulnerability
References:
References: