CERTA-2004-AVI-233
Vulnerability from certfr_avis

None

Description

Shorewall est une interface qui permet la configuration du firewall netfilter.

Une vulnérabilité dans le code chargé de la création des fichiers et des répertoires temporaires permet à un utilisateur mal intentionné, via des liens symboliques habilement construits, d'écraser des fichiers arbitraires avec les privilèges du processus Shorewall.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

La version 1.4.10f corrige cette vulnérabilité.

Shorewall version 1.4.10c et versions antérieures.

Impacted products
Vendor Product Description
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eShorewall version 1.4.10c et versions  ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nShorewall est une interface qui permet la configuration du firewall\nnetfilter.\n\nUne vuln\u00e9rabilit\u00e9 dans le code charg\u00e9 de la cr\u00e9ation des fichiers et des\nr\u00e9pertoires temporaires permet \u00e0 un utilisateur mal intentionn\u00e9, via des\nliens symboliques habilement construits, d\u0027\u00e9craser des fichiers\narbitraires avec les privil\u00e8ges du processus Shorewall.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).  \n\nLa version 1.4.10f corrige cette vuln\u00e9rabilit\u00e9.\n",
  "cves": [],
  "initial_release_date": "2004-07-09T00:00:00",
  "last_revision_date": "2004-07-09T00:00:00",
  "links": [
    {
      "title": "Annonce sur la liste de diffusion Shorewall du 28 juin 2004    :",
      "url": "http://lists.shorewall.net/pipermail/shorewall-announce/2004-June/000385.html"
    }
  ],
  "reference": "CERTA-2004-AVI-233",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-07-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans Shorewall",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200407-07",
      "url": "http://security.gentoo.org/glsa/glsa-200407-07.xml"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…