GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Fri Sep 24, 2004 7:29 am Post subject: [ GLSA 200409-32 ] getmail: Filesystem overwrite vulnerabili |
|
|
Gentoo Linux Security Advisory
Title: getmail: Filesystem overwrite vulnerability (GLSA 200409-32)
Severity: high
Exploitable: local
Date: September 23, 2004
Updated: May 22, 2006
Bug(s): #64643
ID: 200409-32
Synopsis
getmail contains a vulnerability that could potentially allow any local
user to create or overwrite files in any directory on the system. This flaw
can be escalated further and possibly lead to a complete system compromise.
Background
getmail is a reliable fetchmail replacement that supports Maildir,
Mboxrd and external MDA delivery.
Affected Packages
Package: net-mail/getmail
Vulnerable: < 4.2.0
Unaffected: >= 4.2.0
Architectures: All supported architectures
Description
David Watson discovered a vulnerability in getmail when it is
configured to run as root and deliver mail to the maildirs/mbox files
of untrusted local users. A malicious local user can then exploit a
race condition, or a similar symlink attack, and potentially cause
getmail to create or overwrite files in any directory on the system.
Impact
An untrusted local user could potentially create or overwrite files in
any directory on the system. This vulnerability may also be exploited
to have arbitrary commands executed as root.
Workaround
Do not run getmail as a privileged user; or, in version 4, use an
external MDA with explicitly configured user and group privileges.
Resolution
All getmail users should upgrade to the latest version:
Code: | # emerge sync
# emerge -pv ">=net-mail/getmail-4.2.0"
# emerge ">=net-mail/getmail-4.2.0" |
References
getmail ChangeLog
getmail Mailing List
CVE-2004-0880
CVE-2004-0881
Last edited by GLSA on Fri Sep 26, 2014 4:17 am; edited 4 times in total |
|