GLSA-200506-10 : LutelWall: Insecure temporary file creation

Low Nessus Plugin ID 18467


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200506-10 (LutelWall: Insecure temporary file creation)

Eric Romang has discovered that the new_version_check() function in LutelWall insecurely creates a temporary file when updating to a new version.
Impact :

A local attacker could create symbolic links in the temporary file directory, pointing to a valid file somewhere on the filesystem. When the update script is executed (usually by the root user), this would result in the file being overwritten with the rights of this user.
Workaround :

There is no known workaround at this time.


All LutelWall users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-firewall/lutelwall-0.98'

See Also

Plugin Details

Severity: Low

ID: 18467

File Name: gentoo_GLSA-200506-10.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2005/06/13

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:lutelwall, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2005/06/11

Vulnerability Publication Date: 2005/06/06

Reference Information

CVE: CVE-2005-1879

OSVDB: 17173

GLSA: 200506-10