[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[linux-security] tcsh symlink vulnerability
- To: linux-security
- Subject: [linux-security] tcsh symlink vulnerability
- Date: Mon, 11 Dec 2000 15:04:53 -0800 (PST)
Topic
=====
Symlink attack in tcsh.
Problem Description
===================
When using in-here documents using the << syntax tcsh uses a temporary file to
store the data. Unfortunately the temporary file is not created securely and
standard symlink attacks can be used to make tcsh overwrite arbitrary files.
Affected Systems
================
All systems with tcsh versions < 6.10.
Solution
========
upgrade to version 6.10
RedHat 6.x
-----------
rpm -Fvh tcsh-6.10-0.6.x.i386.rpm
RedHat 7.0
----------
rpm -Fvh tcsh-6.10-1.i386.rpm
Caldera
-------
rpm -Fvh tcsh-6.10.00-2.i386.rpm tcsh-doc-html-6.10.00-2.i386.rpm
Mandrake 6.x, 7.0, 7.1
----------------------
rpm -Fvh tcsh-6.09.04-1.2mdk.i586.rpm
Mandrake 7.2
------------
rpm -Fvh tcsh-6.09.04-1.1mdk.i586.rpm
Debian 2.2 (potato)
-------------------
upgrade to tcsh_6.09.00-10_i386.deb and/or tcsh-kanji_6.09.00-10_i386.deb