blob: 9ce491bba12241241649bbb031936b2cb364def5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200407-07">
<title>Shorewall : Insecure temp file handling</title>
Shorewall contains a bug in the code handling the creation of temporary
files and directories. This can allow a non-root user to overwrite
arbitrary system files.
<product type="ebuild">Shorewall</product>
<announced>July 08, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-firewall/shorewall" auto="yes" arch="*">
<unaffected range="ge">1.4.10f</unaffected>
<vulnerable range="le">1.4.10c</vulnerable>
Shorewall is a high level tool for configuring Netfilter, the firewall
facility included in the Linux Kernel.
Shorewall uses temporary files and directories in an insecure manner. A
local user could create symbolic links at specific locations,
eventually overwriting other files on the filesystem with the rights of
the shorewall process.
<impact type="normal">
An attacker could exploit this vulnerability to overwrite arbitrary
system files with root privileges, resulting in Denial of Service or
further exploitation.
There is no known workaround at this time. All users should upgrade to
the latest available version of Shorewall.
All users should upgrade to the latest available version of Shorewall,
as follows:
# emerge sync
# emerge -pv &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;
# emerge &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;</code>
<uri link="">Shorewall Announcement</uri>
<uri link="">CVE-2004-0647</uri>
<metadata tag="submitter">