Slackware Linux 3.4 - 'liloconfig-color' Temporary File



EKU-ID: 24706 CVE: OSVDB-82890;OSVDB-82888;OSVDB-82887 OSVDB-ID:
Author: neonhaze Published: 1998-04-06 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


source: https://www.securityfocus.com/bid/77/info

liloconfig-color creates the file /tmp/reply insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/reply to any file and wait for root to run the program. This will clober the target file.
The file created has permissions -rw-r--r--.

$ ln -s /tmp/reply /etc/passwd
< wait for root to run liloconfig-color >