5959538 2001-01-12 18:06 -0500 /97 rader/ Noel A. Davis <noeld@TFN.NET> Sänt av: joel@lysator.liu.se Importerad: 2001-01-15 20:56 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: noeld@TFN.NET Mottagare: Bugtraq (import) <14813> Ärende: exmh security vulnerability ------------------------------------------------------------ From: "Noel A. Davis" <noeld@TFN.NET> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <Pine.OSF.4.31.0101121805010.31172-100000@fn3.freenet.tlh.fl.us> Brent Welch <brent.welch@interwoven.com> asked that this message about the exmh symlink problem be forwarded to Bugtraq. Thanks, Noel RootPrompt.org -- Nothing but Unix News and information for Unix Sysadmins http://rootprompt.org/ rss/rdf file: http://www.rootprompt.org/rss/ Text Headlines: http://www.rootprompt.org/rss/text.php3 ---------- Forwarded message ---------- Date: Fri, 12 Jan 2001 11:24:38 -0800 From: Brent Welch <brent.welch@interwoven.com> To: Albert White - SUN Ireland <albert.white@ireland.sun.com> Cc: exmh-users@redhat.com, sans@sans.org, noeld@rootprompt.org Subject: Re: exmh security vulnerability on linux.com I have put information about the symlink attack and fixes on http://www.beedub.com/exmh/symlink.html Note that any user can protect themselves without applying a patch. Exmh already has a feature that allows users to choose their own tmp directory via the TMPDIR or EXMHTMPDIR environment variable. Apparently the original bug reported failed to realize this simple remedy. However, a patch that causes exmh to pick a better directory by default is in place and available from the above web page. The change is also checked into CVS. If someone outthere is a member of BUGTRAQ, I would appreciate a posting to their list about this fix. >>>Albert White - SUN Ireland said: > On http://oreilly.linux.com/pub/a/linux/2001/01/08/insecurities.html > > This bug is mentioned: > > "A problem in the bug reporting system for exmh, an X-based interface for th e > MH mail, can cause overwriting of arbitrary system files that are writable b y > the user running exmhexmh encounters a problem in its code, it opens a dialo g > that asks the user what happened and then allows them to send a bug report t o > the author. If the user chooses to e-mail the bug report, exmh creates the > file /tmp/exmhErrorMsg. If the file is a symlink, it will follow the symlink , > overwriting the file that it is linked to. > > As of this time, the author has not released a patch or updated version. It is > recommended that the bug report feature not be used on multiuser systems unt il > this problem has been fixed." > > I think the problem is in error.tcl around line 121: > 119 proc ExmhMailError { w errInfo } { > 120 global exmh > 121 if [catch {open [Env_Tmp]/exmhErrorMsg w} out] { > 122 Exmh_Status "Cannot open [Env_Tmp]/exmhErrorMsg" purple > 123 return > 124 } > > I guess all that is needed to fix this is a check to see that the file isn't a > symlink before opening it. I don't know how to do that in tcl though :) > > Cheers, > ~Al > > > --==_Exmh_-536764512P > Content-Type: application/pgp-signature > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.2 (SunOS) > Comment: Exmh version 2.2 06/23/2000 > > iD4DBQE6XxH3pfmE8MiMM1IRAh4AAJjoZuUKRrXwlU3NALPNXmOCY15VAJwNr82Q > H7r69/0P2qxWE66bcPUCxg== > =2+zl > -----END PGP SIGNATURE----- > > --==_Exmh_-536764512P-- -- Brent Welch <brent.welch@interwoven.com> http://www.interwoven.com (5959538) --------------------------------(Ombruten)