Package: vobcopy
Version: 0.5.14-2
Severity: important
Tags: security

vobcopy -q opens /tmp/vobcopy.bla insecurely:

open("/tmp/vobcopy.bla", O_WRONLY|O_CREAT|O_APPEND|O_LARGEFILE, 0666) = 2

Similarly, vopbcopy -v -v opens /tmp/vobcopy_0.5.14.log insecurely:

open("/tmp/vobcopy_0.5.14.log", O_WRONLY|O_CREAT|O_APPEND|O_LARGEFILE, 0666) = 2

Since there's no O_EXCL /tmp/vobcopy.bla can already exist as a symlink
and will be followed, appending to an arbitrary file. Thankfully it is
an append, so there's no direct data loss. The log files also tend to be
empty so the best attack I can think of ATM is that If vobvopy is run as
root, it can at be used to create /etc/nologin.

The fix is simply to open the file with O_EXCL, or better, to use
a standard, safe temp file function. (Which would have the benefit of
also making it respect the TMPDIR environment variable.)

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages vobcopy depends on:
ii  libc6                         2.6.1-6    GNU C Library: Shared libraries
ii  libdvdread3                   0.9.7-3    library for reading DVDs

vobcopy recommends no packages.

-- no debconf information

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to