Gentoo Logo

Shorewall : Insecure temp file handling

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200407-07 / Shorewall
Release Date July 08, 2004
Latest Revision May 22, 2006: 02
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-firewall/shorewall <= 1.4.10c >= 1.4.10f All supported architectures

Related bugreports: #55675

Synopsis

Shorewall contains a bug in the code handling the creation of temporary files and directories. This can allow a non-root user to overwrite arbitrary system files.

2.  Impact Information

Background

Shorewall is a high level tool for configuring Netfilter, the firewall facility included in the Linux Kernel.

Description

Shorewall uses temporary files and directories in an insecure manner. A local user could create symbolic links at specific locations, eventually overwriting other files on the filesystem with the rights of the shorewall process.

Impact

An attacker could exploit this vulnerability to overwrite arbitrary system files with root privileges, resulting in Denial of Service or further exploitation.

3.  Resolution Information

Workaround

There is no known workaround at this time. All users should upgrade to the latest available version of Shorewall.

Resolution

All users should upgrade to the latest available version of Shorewall, as follows:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=net-firewall/shorewall-1.4.10f"
# emerge ">=net-firewall/shorewall-1.4.10f"

4.  References



Print

Page updated July 08, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.