[Bug 607264] Re: vulnerability: rewrite arbitrary user file

Bug Watch Updater 607264 at bugs.launchpad.net
Wed Aug 10 12:46:30 UTC 2011


** Changed in: aptitude (Debian)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to aptitude in Ubuntu.
https://bugs.launchpad.net/bugs/607264

Title:
  vulnerability: rewrite arbitrary user file

Status in “aptitude” package in Ubuntu:
  Fix Released
Status in “aptitude” package in Debian:
  Fix Released

Bug description:
  Binary package hint: aptitude

  Hi, I've just discovered that aptitude is vulnerable to rewriting any
  user (maybe root) file:

  bool hier_editor::handle_key(const cw::config::key &k)
  ...
        if(homedir.empty())
  	{
  ...
  	  cfgfile = "/tmp/function_pkgs";
  	}
  ...
        save_hier(cfgfile);

  Here attacker can create link to any file in the system that user may
  write to. If process has no $HOME set, this file would be overwritten.

  It is rare that $HOME is null, but it such rare case it is vulnerable.

  Thanks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aptitude/+bug/607264/+subscriptions




More information about the foundations-bugs mailing list