- ------------------------------------------------------------------------Debian Security Advisory DSA-1648-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
October 08, 2008                    http://www.debian.org/security/faq
- ------------------------------------------------------------------------Package        : mon
Vulnerability  : insecure temporary files
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-4477
Debian Bug     : 496398

Dmitry E. Oboukhov discovered that the test.alert script used in one of the 
alert functions in mon, a system to monitor hosts or services and alert 
about problems, creates temporary files insecurely, which may lead to a local 
denial of service through symlink attacks.

For the stable distribution (etch), this problem has been fixed in
version 0.99.2-9+etch2.

For the testing (lenny) and unstable distribution (sid), this problem has
been fixed in version 0.99.2-13.

We recommend that you upgrade your mon package.

Upgrade instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------Source archives:

      Size/MD5 checksum:      660 777a64c7f02bb12ed424f0cc2ca74b09
      Size/MD5 checksum:    17561 21156aea6f48d98eaab3b43e42a062b1
      Size/MD5 checksum:   166255 2a0d34cd493abc10042bf05d2271a55b

alpha architecture (DEC Alpha)

      Size/MD5 checksum:   181564 98676f30cb451402908bb933c7996a23

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:   178732 5d1332ad8f248b39ccdebc1b78d6d3d8

arm architecture (ARM)

      Size/MD5 checksum:   177878 8c6d31fb6423e0f7850add19c15c412a

hppa architecture (HP PA RISC)

      Size/MD5 checksum:   179802 9f3758a0f88fc8022f2d2b255e5e5e0f

i386 architecture (Intel ia32)

      Size/MD5 checksum:   178842 96745e69e7720b72d50f35f60a837e9b

ia64 architecture (Intel ia64)

      Size/MD5 checksum:   179774 b1c5d9ef86303add929ef02b7ba75db5

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:   178722 1b12a60e19b32271a38ea16175465166

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:   178396 55e3e042f8490c0ffe563fe84394940f

powerpc architecture (PowerPC)

      Size/MD5 checksum:   178204 71f4e1fe9623e4bd235a3cbbad9eb7b1

s390 architecture (IBM S/390)

      Size/MD5 checksum:   178180 cc178896b1cb25a50401ef6f713e0a4b

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:   179196 ceb4cc733f22bdeefefe6d695c77c774


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New mon packages fix insecure temporary files

October 8, 2008
Dmitry E

Summary

Severity

Related News