Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 4 Mar 2000 02:10:02 -0800 (PST)
From:      Sheldon Hearn <sheldonh@uunet.co.za>
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: gnu/17175: [PATCH] send-pr predictable tempfile vulnerability 
Message-ID:  <200003041010.CAA18738@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR gnu/17175; it has been noted by GNATS.

From: Sheldon Hearn <sheldonh@uunet.co.za>
To: phil@rivendell.apana.org.au
Cc: FreeBSD-gnats-submit@FreeBSD.ORG
Subject: Re: gnu/17175: [PATCH] send-pr predictable tempfile vulnerability 
Date: Sat, 04 Mar 2000 12:03:23 +0200

 On Sat, 04 Mar 2000 19:44:21 +1000, Phil Homewood wrote:
 
 > 	Create lots of symlinks from /tmp/p$$ to something
 > 	interesting. Run send-pr, or wait for your victim to do
 > 	so. Observe target file now containing victim's name.
 
 This only works when the user running send-pr has write permission on
 the affected file, right?
 
 While this should be fixed, it's certainly not a show-stopper if it's
 just a user-to-user annoyance.  Nobody sensible runs send-pr as root.
 
 So, assuming I'm right about the urgency involved,  have you
 investigated the possibility of a patch from the vendor?  Although the
 send-pr.sh file isn't on the vendor branch any more, it'd make sense to
 try to use a vendor-supplied patch.
 
 Ciao,
 Sheldon.
 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003041010.CAA18738>