Date: Sat, 4 Mar 2000 19:44:21 +1000 (EST) From: Phil Homewood <phil@rivendell.apana.org.au> To: FreeBSD-gnats-submit@freebsd.org Subject: gnu/17175: [PATCH] send-pr predictable tempfile vulnerability Message-ID: <200003040944.TAA45571@rivendell.apana.org.au>
next in thread | raw e-mail | index | archive | help
>Number: 17175 >Category: gnu >Synopsis: [PATCH] send-pr predictable tempfile vulnerability >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Mar 4 01:50:01 PST 2000 >Closed-Date: >Last-Modified: >Originator: Phil Homewood >Release: FreeBSD 3.4-STABLE i386 >Organization: >Environment: $FreeBSD: src/gnu/usr.bin/send-pr/send-pr.sh,v 1.9.2.3 1999/08/29 14:35:18 peter Exp $ >Description: send-pr overwrites files named after (predictable) PIDs in /tmp, following symlinks. The exploits are obvious. >How-To-Repeat: Create lots of symlinks from /tmp/p$$ to something interesting. Run send-pr, or wait for your victim to do so. Observe target file now containing victim's name. >Fix: Workaround: set TMPDIR to something safe before invoking send-pr. Fix: --- src/gnu/usr.bin/send-pr/send-pr.sh.orig Sat Sep 4 06:06:55 1999 +++ src/gnu/usr.bin/send-pr/send-pr.sh Sat Mar 4 19:33:22 2000 @@ -73,11 +73,9 @@ # -[ -z "$TMPDIR" ] && TMPDIR=/tmp - -TEMP=$TMPDIR/p$$ -BAD=$TMPDIR/pbad$$ -REF=$TMPDIR/pf$$ +TEMP=`mktemp -t send-pr.p` || exit 1 +BAD=`mktemp -t send-pr.pbad` || exit 1 +REF=`mktemp -t send-pr.pf` || exit 1 if [ -z "$LOGNAME" -a -n "$USER" ]; then LOGNAME=$USER Additional note: Do not edit /usr/bin/send-pr while sending a PR. You will lose all your hard work when you exit. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003040944.TAA45571>