blob: 883f0f9bb92470e50e7dde16bb83b1b47da087a1 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200410-25">
<title>Netatalk: Insecure tempfile handling in</title>
The script, included in the Netatalk package, is vulnerable to
symlink attacks, potentially allowing a local user to overwrite arbitrary
files with the rights of the user running the utility.
<product type="ebuild">Netatalk</product>
<announced>October 25, 2004</announced>
<revised>October 25, 2004: 01</revised>
<package name="net-fs/netatalk" auto="yes" arch="*">
<unaffected range="ge">1.6.4-r1</unaffected>
<vulnerable range="lt">1.6.4-r1</vulnerable>
Netatalk is a kernel level implementation of the AppleTalk Protocol Suite,
which allows Unix hosts to act as file, print, and time servers for Apple
computers. It includes several script utilities, including
The script creates temporary files in world-writeable directories
with predictable names.
<impact type="normal">
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When is executed, this would result in the file being overwritten with
the rights of the user running the utility, which could be the root user.
There is no known workaround at this time.
All Netatalk users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-fs/netatalk-1.6.4-r1"
# emerge ">=net-fs/netatalk-1.6.4-r1"</code>
<uri link="">CAN-2004-0974</uri>
<metadata tag="submitter" timestamp="Sun, 10 Oct 2004 22:02:01 +0000">
<metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:51 +0000">