Linux Security
    Linux Security
    Linux Security

    Debian: sysstat Insecure temporary file vulnerability

    Date 05 Apr 2004
    Posted By LinuxSecurity Advisories
    As usual for temporary file vulnerabilities, this allows local users to read/overwrite arbitrary files with the permissions of the running user.
    Debian Security Advisory DSA 460-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    April 3rd, 2004                
    - --------------------------------------------------------------------------
    Package        : sysstat
    Vulnerability  : insecure temporary file
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2004-0108
    Alan Cox discovered that the isag utility (which graphically displays
    data collected by the sysstat tools), creates a temporary file without
    taking proper precautions.  This vulnerability could allow a local
    attacker to overwrite files with the privileges of the user invoking
    The update used in DSA 460-1 did not fix every occurrence of the bug.
    DSA 460-2 includes a more complete fix.
    For the current stable distribution (woody) this problem has been
    fixed in version 4.0.4-1woody2.
    For the unstable distribution (sid) this problem has been fixed in
    version 5.0.2-1.
    We recommend that you update your sysstat package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      646 7f580bd95e4beb891308f768d23c8cf7
          Size/MD5 checksum:     9034 84514ad26e9ee46ef816a48cc0130aca
          Size/MD5 checksum:    99410 9bab6bb01949ba36ce0e5520699ebdf2
      Architecture independent components:
          Size/MD5 checksum:    15948 51625bb242d8813a5a36b6f46762037d
      Alpha architecture:
          Size/MD5 checksum:   101734 b01b8832667c4b2ccfe1491761ae3262
      ARM architecture:
          Size/MD5 checksum:    86348 d1e0b2ce8b9dd2be66127c6de76aad3e
      Intel IA-32 architecture:
          Size/MD5 checksum:    78712 3b33e776572470aa69c0d38989277205
      Intel IA-64 architecture:
          Size/MD5 checksum:   115198 d9cc1e755a52348c8cced764616609a5
      HP Precision architecture:
          Size/MD5 checksum:    95478 1fe245a0dfa1660cc15ba98b8f37ee17
      Motorola 680x0 architecture:
          Size/MD5 checksum:    74918 f451be4419f98e8d3a2a8698385a64c5
      Big endian MIPS architecture:
          Size/MD5 checksum:    87870 85fad1a5a2c7b80860a821ccb72506e3
      Little endian MIPS architecture:
          Size/MD5 checksum:    87652 d73a29ed3a0bf19d2998276646c73934
      PowerPC architecture:
          Size/MD5 checksum:    86980 b7e43a983e0bef5525249d76151de17c
      IBM S/390 architecture:
          Size/MD5 checksum:    83140 9741e6555f390f9248b53be845e72376
      Sun Sparc architecture:
          Size/MD5 checksum:    99346 ebfb5cfe81ac719d76bed6f71a232bec
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.