Login
Newsletter
Werbung

Sicherheit: Unsichere Verwendung von /tmp in squid
Aktuelle Meldungen Distributionen
Name: Unsichere Verwendung von /tmp in squid
ID: TLSA2001008
Distribution: TurboLinux
Plattformen: Keine Angabe
Datum: Di, 22. Mai 2001, 13:00
Referenzen: Keine Angabe
Applikationen: Squid

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1




___________________________________________________________________________

Turbolinux Security Announcement

Package: Squid
Vulnerable Packages: All versions previous to 2.3.STABLE4-1
Date: 05/04/2001 5:00 PDT

Affected Turbolinux platforms: TL 6.1 WorkStation,
All Turbolinux versions
6.0.5 and earlier

Turbolinux Advisory ID#: TLSA2001008

Credits: Vulnerability discovered by Greg KH<greg@wirex.com>
___________________________________________________________________________

A security hole has been discovered in the package squid. Please update
this package in your installation as soon as possible.
___________________________________________________________________________

1. Problem Summary(From the BugTraq database at securityfocus.com,id#2184)

A /tmp file race condition vulnerability exists. Squid can be
set up to send emails notifying the administrator of any updates.
Whenever the email is created, files are created insecurely
in the /tmp directory and the pre-existence of these files is
not queried. Usually, the file creations occur when the system clock
is reporting an incorrect time or a development version of squid is
used. Therefore, it is possible for a user with malicious motives to
guess the handle of a future /tmp file, and create a symbolic link to a
file writable by the UID of the squid process, thus overwriting a file
owned by the squid user, or appending to and corrupting the file.

2. Solution

Update the package from our ftp server by running the following command:

rpm -Uvh ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/squid-2.3.STABLE4-1.i386.rpm

The source RPM can be downloaded here:


ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/squid-2.3.STABLE4-1.src.rpm

**Note: You must rebuild and install the RPM if you choose to download
and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE
THE SECURITY HOLE.

Please verify the MD5 checksums of the updates before you install:

MD5 sum Package Name
--------------------------------------------------------------------------
d9844e9082390dc146893c836e3ea2a2 squid-2.3.STABLE4-1.i386.rpm
2412fc6befc100bd757de8fc91ecfc6c squid-2.3.STABLE4-1.src.rpm
___________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________

You can find more updates on our ftp server:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0
Workstation and Server security updates


Our webpage for security announcements:

http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

security@turbolinux.com
___________________________________________________________________________

Subscribe to the Turbolinux Security Mailing lists:

TL-security - A moderated list for discussing security issues
Turbolinux products.

Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

TL-security-announce - An announce-only mailing list for security
updates and alerts.

Subscribe at:

http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE6+HROcpw52/ZatwoRAvMcAJ4l0Mxon2QlZHy4FyAC7G+bPHrrfQCfQKcY
gh347m4SU77Vih2m1qAED5Y=
=OrIH
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung