Ubuntu

vulnerability: rewrite arbitrary user file

Reported by Vasily Kulikov on 2010-07-19
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
feh (Debian)
Fix Released
Unknown
feh (Ubuntu)
Low
Unassigned

Bug Description

Binary package hint: feh

Hi, I've just discovered that feh is vulnerable to rewriting any user file:

      tmpname_timestamper =
         estrjoin("", "/tmp/feh_", cppid, "_", basename, NULL);
...
            execlp("wget", "wget", "-N", "-O", tmpname_timestamper, newurl,
                   quiet, (char*) NULL);

If attacker knows PID of feh and knows the URL, it can create the link to any user file. wget would overwrite it.

Thanks.

Kees Cook (kees) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better.

The latest release of Ubuntu is not vulnerable to symlink race attack, but earlier release will need fixing. https://wiki.ubuntu.com/Security/Features#symlink

Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

visibility: private → public
Changed in feh (Ubuntu):
status: New → Confirmed
importance: Undecided → Low
Changed in feh (Debian):
status: Unknown → New
Changed in feh (Debian):
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.