The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=240576 | |
http://www.redhat.com/support/errata/RHSA-2009-1341.html | vendor advisory |
http://secunia.com/advisories/32390 | third party advisory |
http://secunia.com/advisories/32387 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10799 | vdb entry signature |
http://www.vupen.com/english/advisories/2011/0419 | vdb entry |
http://www.ubuntu.com/usn/USN-875-1 | vendor advisory |
http://www.securityfocus.com/bid/31904 | vdb entry |
http://www.openwall.com/lists/oss-security/2008/10/13/3 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=467386 | |
http://secunia.com/advisories/36530 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00666.html | vendor advisory |
http://secunia.com/advisories/43362 | third party advisory |
http://www.redhat.com/support/errata/RHSA-2011-0266.html | vendor advisory |