vulnerability: rewrite arbitrary user file
Bug #607309 reported by
Vasily Kulikov
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
conky (Debian) |
Fix Released
|
Unknown
|
|||
conky (Ubuntu) |
Fix Released
|
Low
|
Unassigned |
Bug Description
Binary package hint: conky
Hi, I've just discovered that conky is vulnerable to rewriting any user file:
char *getSkillname(const char *file, int skillid)
...
if (!file_
skilltree = getXmlFromAPI(NULL, NULL, NULL, EVEURL_SKILLTREE);
writeSkilltre
free(skilltree);
}
getXmlFromAPI() can be executed for a long time (e.g. bad connection), so between file_exists() and write_file() attacker can create link to any user file named "/tmp/.cesf". Attacker can choose the time when to create the link by watching for network connections.
Thanks.
Related branches
Changed in conky (Debian): | |
status: | Unknown → New |
Changed in conky (Debian): | |
status: | New → Fix Released |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better.
The latest release of Ubuntu is not vulnerable to symlink race attacks, but earlier releases will need fixing. https:/ /wiki.ubuntu. com/Security/ Features# symlink
Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res