The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] apachetop Insecure Temporary File Creation


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 6 Oct 2005 10:44:42 +0200
Subject: [UNIX] apachetop Insecure Temporary File Creation
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051006134901.7EEBB57F1@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  apachetop Insecure Temporary File Creation
------------------------------------------------------------------------


SUMMARY

 <http://clueful.shagged.org/apachetop/>; apachetop - "Realtime Apache 
monitoring tool. A curses-based top-like display for Apache information, 
including requests per second, bytes per second, most popular URLs, etc."

apachetop creates a predictable temporary file, this allows a local 
attacked to use the program to preform symlink attacks.

DETAILS

Vulnerable Systems:
 * apachetop versions 0.12.5 and prior

The vulnerability is caused due to temporary file being created 
insecurely. This can be exploited via symlink attacks in combination to 
create and overwrite arbitrary files with the privileges of the user 
running the affected script.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2660>; 
CAN-2005-2660

Solution:
Apply : apachetop_CAN-2005-2660.patch
Patch from Steve Kemp (Debian)
 <http://bugs.gentoo.org/attachment.cgi?id=69342>; 
http://bugs.gentoo.org/attachment.cgi?id=69342

Vulnerable code :
Take a look at : src/apachetop.h

247 #define DEBUG_OUTPUT "/tmp/atop.debug"

Then in : src/apachetop.cc

85 cf.debug = true;

1103 int dprintf(const char *fmt, ...) /* {{{ */
1104 {
1105 FILE *d;
1106 va_list args;
1107
1108 if (cf.debug && (d = fopen(DEBUG_OUTPUT, "a")))
1109 {
1110  va_start(args, fmt);
1111  vfprintf(d, fmt, args);
1112  fclose(d);
1113  va_end(args);
1114 }
1115
1116 return 0;
1117 } /* }}} */


ADDITIONAL INFORMATION

The information has been provided by  <mailto:eromang@zataz.net.> Eric 
Romang.
The original article can be found at:  
<http://www.zataz.net/adviso/apachetop-09022005.txt>; 
http://www.zataz.net/adviso/apachetop-09022005.txt
The bug report can be found at:  
<http://bugs.gentoo.org/show_bug.cgi?id=104473>; 
http://bugs.gentoo.org/show_bug.cgi?id=104473




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру