LNSA-#2004-0009: GNU Automake symbolic link vulnerability

From: Vincenzo Ciaglia (ciaglia_at_netwosix.org)
Date: 04/08/04

  • Next message: Cesar: "Re: [Full-Disclosure] Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache"
    To: bugtraq@securityfocus.com
    Date: Thu, 8 Apr 2004 18:14:40 +0200
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    ************************************************************************************
    Netwosix Linux Security Advisory #2004-0009 <http://www.netwosix.org>
    - ------------------------------------------------------------------------------------

    Package name:     automake
    Summary:           Automake symbolic link vulnerability
    Date:                 2004-04-08
    Affected versions:  Netwosix 1.0
                          Netwosix 1.1
    ************************************************************************************

    - - -> Package description:
    - - ------------------------
     Automake is a tool for automatically generating `Makefile.in' files compliant
    with the GNU Coding Standards. Automake requires the use of GNU Autoconf.

    - - -> Problem description:
    - - ------------------------

    Automake may be vulnerable to a symbolic link attack which may allow an
    attacker to modify data or escalate their privileges. This is due to
    the insecure way Automake creates directories during compilation. An
    attacker may be able to create symbolic links in the place of files
    contained in the affected directories, which may potentially lead to
    elevated privileges due to modification of data.

    - - -> Action:
    - - ------------------------
      We recommend that all systems with this package installed be upgraded.
      Please note that if you do not need the functionality provided by this
      package, you may want to remove it from your system.

    - - -> Location:
    - - ---------------------

      You can download the latest version of this package in NEPOTE format from:
      <http://download.netwosix.org/0009/nepote>

    - - -> Nepote Update
    - - ---------------------

    See this instructions to update the port of this package:

            # cd /usr/ports/
            # wget http://download.netwosix.org/0009/nepote
            # sh nepote (to install the new and updated package)

    - - -> References
    - - ---------------------

            Specific references for this advisory:
                   http://www.securityfocus.com/advisories/6542

    - - -> About Linux Netwosix:
    - - ---------------------------------
    Linux Netwosix is a powerful and optimized Linux distribution for servers
    and Network Security related jobs.  It can also be used for special operations
    such as penetration testing with its big collection of security oriented
    software and sources. It's a light distribution created for the requirements
    of every SysAdmin and it's very portable and highly configurable. Our
    philosophy is to give greater liberty for  configuration to the SysAdmin.
    Only in this way can he/she configure a powerful and stable server machine.
    Linux Netwosix also has a powerful ports system (Nepote) similar to the xBSD
    systems but more flexible and usable.

    - - -> Questions?
    - - ---------------------
      Check out our mailing lists:
      <http://www.netwosix.org/mailing.html>

      The advisory itself is available at
      <http://www.netwosix.org/adv09.html>
    - - --------------------------------------------------

    MD5sums of the packages:
    - - - --------------------------------------------------------------------------
    e9aba8cfdc7276a15d261feab8a54e09  0009/nepote
    - - - --------------------------------------------------------------------------

    Vincenzo Ciaglia - Linux Netwosix Security Advisories
    <ciaglia@netwosix.org> - <http://www.netwosix.org>
    - --
    Vincenzo Ciaglia
    Linux Netwosix Team - [ Keyid: 0x6BB3E24A]
    Key fingerprint = 4B3E A25F 2A7A 0C19 1A97 616B EA3C FDA4 6BB3 E24A
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.4 (GNU/Linux)

    iD8DBQFAdXpw6jz9pGuz4koRAjpsAJ9AnlYG99bvRSKTzE1WC8SbLiEx3QCfW3u7
    6MYD/ovK28w+8W6K/jjNleo=
    =i8pa
    -----END PGP SIGNATURE-----


  • Next message: Cesar: "Re: [Full-Disclosure] Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache"

    Relevant Pages

    • LNSA-#2004-0009: GNU Automake symbolic link vulnerability
      ... Affected versions: Netwosix 1.0 ... Automake is a tool for automatically generating `Makefile.in' files compliant ... We recommend that all systems with this package installed be upgraded. ... Linux Netwosix is a powerful and optimized Linux distribution for servers ...
      (Bugtraq)
    • [Full-Disclosure] LNSA-#2004-0009: GNU Automake symbolic link vulnerability
      ... Affected versions: Netwosix 1.0 ... Automake is a tool for automatically generating `Makefile.in' files compliant ... We recommend that all systems with this package installed be upgraded. ... Linux Netwosix is a powerful and optimized Linux distribution for servers ...
      (Full-Disclosure)
    • LNSA-#2004-0016: Multiple problems in Ethereal 0.10.4 (Jul, 23 2004)
      ... Affected versions: Netwosix 1.0 Netwosix 1.1 ... runs on all popular computing platforms, including Unix, Linux, and Windows. ... We recommend that all systems with this package installed be upgraded. ... and Network Security related jobs. ...
      (Bugtraq)
    • LNSA-#2004-0007: Multiple security problems in Ethereal
      ... Netwosix Linux Security Advisory #2004-0007 ... Affected versions: Netwosix 1.0 ... runs on all popular computing platforms, including Unix, Linux, and Windows. ... We recommend that all systems with this package installed be upgraded. ...
      (Bugtraq)
    • [Full-Disclosure] LNSA-#2004-0007: Multiple security problems in Ethereal
      ... Netwosix Linux Security Advisory #2004-0007 ... Affected versions: Netwosix 1.0 ... runs on all popular computing platforms, including Unix, Linux, and Windows. ... We recommend that all systems with this package installed be upgraded. ...
      (Full-Disclosure)