SB2014041808 - Link following in a2ps (Alpine package)
Published: April 18, 2014
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Link following (CVE-ID: CVE-2001-1593)
The vulnerability allows a local non-authenticated attacker to manipulate data.
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=c44e1739d09485e6e56c3e8d179f02da33a0a7bf
- https://git.alpinelinux.org/aports/commit/?id=44f09f98c5e4c349dcc6b25edde778f864f4ca5a
- https://git.alpinelinux.org/aports/commit/?id=dbbec23e368ed2962d9d85b8f25fcaf0e61d1781
- https://git.alpinelinux.org/aports/commit/?id=dc904137c8e3e8f68a9410dbc8bfac56b382b50d
- https://git.alpinelinux.org/aports/commit/?id=8d6047b8be70cba29f22c2d0f809907e7367bcbb
- https://git.alpinelinux.org/aports/commit/?id=9544460de3b7282c473654a2a67586c6645a05c1
- https://git.alpinelinux.org/aports/commit/?id=ad0ffed17c16a068739dacf23ea90c2a50b2f11f