SB2014040601 - Link following in GNU a2ps
Published: April 6, 2014 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Link following (CVE-ID: CVE-2001-1593)
The vulnerability allows a local non-authenticated attacker to manipulate data.
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
Remediation
Install update from vendor's website.
References
- http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch
- http://seclists.org/oss-sec/2014/q1/237
- http://seclists.org/oss-sec/2014/q1/253
- http://seclists.org/oss-sec/2014/q1/257
- http://www.debian.org/security/2014/dsa-2892
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
- https://bugzilla.redhat.com/show_bug.cgi?id=1060630