GLSA-200506-10 : LutelWall: Insecure temporary file creation

low Nessus Plugin ID 18467

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200506-10 (LutelWall: Insecure temporary file creation)

Eric Romang has discovered that the new_version_check() function in LutelWall insecurely creates a temporary file when updating to a new version.
Impact :

A local attacker could create symbolic links in the temporary file directory, pointing to a valid file somewhere on the filesystem. When the update script is executed (usually by the root user), this would result in the file being overwritten with the rights of this user.
Workaround :

There is no known workaround at this time.

Solution

All LutelWall users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-firewall/lutelwall-0.98'

See Also

https://security.gentoo.org/glsa/200506-10

Plugin Details

Severity: Low

ID: 18467

File Name: gentoo_GLSA-200506-10.nasl

Version: 1.17

Type: local

Published: 6/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:lutelwall, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 6/11/2005

Vulnerability Publication Date: 6/6/2005

Reference Information

CVE: CVE-2005-1879

GLSA: 200506-10