a2ps insecure temporary file use

2014.02.03
Risk: Low
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

Hello, Jakub Wilk found that a2ps, a tool to convert text and other types of files to PostScript, insecurely used a temporary file in spy_user(). A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running a2ps: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385 The original report notes there are calls to tempname_ensure(). If any of those are found to be vulnerable, would they use the same CVE number, or require a different one? References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385 https://bugzilla.redhat.com/show_bug.cgi?id=1060630 Thanks, -- Murray McAllister / Red Hat Security Response Team

References:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
https://bugzilla.redhat.com/show_bug.cgi?id=1060630


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top