FreeBSD : GNU libtool insecure temporary file handling (cacaffbc-5e64-11d8-80e3-0020ed76ef5a)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

libtool attempts to create a temporary directory in which to write
scratch files needed during processing. A malicious user may create a
symlink and then manipulate the directory so as to write to files to
which she normally has no permissions.

This has been reported as a ``symlink vulnerability'', although I do
not think that is an accurate description.

This vulnerability could possibly be used on a multi-user system to
gain elevated privileges, e.g. root builds some packages, and another
user successfully exploits this vulnerability to write to a system
file.

See also :

http://www.nessus.org/u?cb8a324b
http://www.securityfocus.com/archive/1/352333
http://www.nessus.org/u?752746e8

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37213 (freebsd_pkg_cacaffbc5e6411d880e30020ed76ef5a.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now