1. Gentoo Linux Security Advisory
Version Information
Advisory Reference GLSA 200701-19 / openldap
Release Date January 23, 2007
Latest Revision January 23, 2007: 01
Impact low
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-nds/openldap < 2.1.30-r10, < 2.2.28-r7, < 2.3.30-r2 >= 2.1.30-r10, >= 2.2.28-r7, >= 2.3.30-r2 All supported architectures
Related bugreports: #159508
Synopsis
A shell script commonly released with OpenLDAP makes insecure usage of files in /tmp during the emerge process.
2. Impact Information
Background
OpenLDAP Software is an open source implementation of the Lightweight Directory Access Protocol.
Description
Tavis Ormandy of the Gentoo Linux Security Team has discovered that the file gencert.sh distributed with the Gentoo ebuild for OpenLDAP does not exit upon the existence of a directory in /tmp during installation allowing for directory traversal.
Impact
A local attacker could create a symbolic link in /tmp and potentially overwrite arbitrary system files upon a privileged user emerging OpenLDAP.
3. Resolution Information
Workaround
There is no known workaround at this time.
Resolution
All OpenLDAP users should upgrade to the latest version:
Code Listing 3.1
# emerge --sync
# emerge --ask --oneshot --verbose "net-nds/openldap"
Print
Updated January 23, 2007
Summary: This is a Gentoo Linux Security Advisory
security@gentoo.org
Contact Address
Donate to support our development efforts.
VR Hosted
Tek Alchemy
SevenL.net
php|architect
Search for in Google by Dino
jueves, 25 de enero de 2007
OpenLDAP: Insecure usage of /tmp during installation
Publicado por http://hackinganddefense.blogspot.com/ Etiquetas: SEGURIDAD INFORMATICA en 9:39 p.m.
Suscribirse a:
Comentarios de la entrada (Atom)
No hay comentarios.:
Publicar un comentario