blob: acda5ccbfbc249714969553f3100c9aa3b7eeebf [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200410-24">
<title>MIT krb5: Insecure temporary file use in</title>
The script, included in the mit-krb5 package, is vulnerable to
symlink attacks, potentially allowing a local user to overwrite arbitrary
files with the rights of the user running the utility.
<product type="ebuild">mit-krb5</product>
<announced>October 25, 2004</announced>
<revised>January 30, 2005: 02</revised>
<package name="app-crypt/mit-krb5" auto="yes" arch="*">
<unaffected range="ge">1.3.5-r1</unaffected>
<unaffected range="rge">1.3.4-r1</unaffected>
<vulnerable range="le">1.3.5</vulnerable>
MIT krb5 is the free implementation of the Kerberos network
authentication protocol written by the Massachusetts Institute of
The script creates temporary files in world-writeable
directories with predictable names.
<impact type="normal">
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When is called, this would result in the file being overwritten
with the rights of the user running the utility, which could be the
root user.
There is no known workaround at this time.
All MIT krb5 users should upgrade to the latest version:
# emerge sync
# emerge -pv &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;
# emerge &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;</code>
<uri link="">CAN-2004-0971</uri>
<metadata tag="submitter" timestamp="Tue, 19 Oct 2004 17:38:41 +0000">
<metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:38 +0000">