blob: dc4c970f796502cf1c2c14532effe4992d262ecd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200502-01">
<title>FireHOL: Insecure temporary file creation</title>
<synopsis>
FireHOL is vulnerable to symlink attacks, potentially allowing a local user
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">FireHOL</product>
<announced>February 01, 2005</announced>
<revised>May 22, 2006: 02</revised>
<bug>79330</bug>
<access>local</access>
<affected>
<package name="net-firewall/firehol" auto="yes" arch="*">
<unaffected range="ge">1.224</unaffected>
<vulnerable range="lt">1.224</vulnerable>
</package>
</affected>
<background>
<p>
FireHOL is an iptables rules generator.
</p>
</background>
<description>
<p>
FireHOL insecurely creates temporary files with predictable names.
</p>
</description>
<impact type="normal">
<p>
A local attacker could create malicious symbolic links to arbitrary
system files. When FireHOL is executed, this could lead to these files
being overwritten with the rights of the user launching FireHOL,
usually the root user.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All FireHOL users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/firehol-1.224&quot;</code>
</resolution>
<references>
<uri link="http://cvs.sourceforge.net/viewcvs.py/firehol/firehol/firehol.sh">FireHOL CVS log</uri>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0225">CVE-2005-0225</uri>
</references>
<metadata tag="requester" timestamp="Fri, 28 Jan 2005 10:32:33 +0000">
koon
</metadata>
<metadata tag="submitter" timestamp="Sat, 29 Jan 2005 16:54:50 +0000">
vorlon078
</metadata>
<metadata tag="bugReady" timestamp="Mon, 31 Jan 2005 23:48:34 +0000">
lewk
</metadata>
</glsa>