Package: axyl
Version: 2.1.7
Severity: grave
Tags: security
Justification: user security hole

The prerm script creates /tmp/axyl.conf by copying /etc/axyl/axyl.conf over
it.

The postrm script sources that file.

That opens opportunities to someone with a local account to trigger
execution of malicious code by crafting /tmp/axyl.conf (it probably requires
to ensure that the "cp" action in prerm fails to avoid the crafter file to
be overwritten).

Even if the exploit possibilities may be small, this is still pretty
dangerous to keep.

An easy and not too much invasive fix would be to copy the file in /root
instead of /tmp.

PS: the severity may be overflated and I don't feel like I have enough
security experience to really decide whether this is release critical and
also if it deserves an update to stable and oldstable. I will fix this in a
soon-to-come NMU (meant for l10n purposes) with the above quick and dirty
fix (thanks to Nico Golde for the suggestion).




-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to