Package: claws-mail-tools
Severity: important
Tags: security

Hi,
the sylprint.pl also shipped in an installation of the 
package is prone to a symlink attack.
sylprint.pl:
213 $tmpfn="/tmp/sylprint.$ENV{'USER'}.$$";
214 open(TMP,">$tmpfn");
215 open(FIN,"<$ARGV[0]");
216 LN: while (<FIN>) {
217 >···$ln = $_;
218 >···foreach $n (@cabn) {
[...]
242 # print headers
243 if ($headers) {
244 >···print TMP "\n\n";

Since the process id is pretty predictable as well as the user name in
this case an attacker could create a symlink to the tmp file and thereby
overwriting arbitrary files owned by the user.
Opening with O_EXCL and raising an error would be sufficient from my
point of view.
Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp6iOr4EhyIU.pgp
Description: PGP signature

Reply via email to