Package: chillispot Version: 1.0-9 Severity: grave Tags: security From postinst:
8<------------------------------------------>8 # config file CONFIGFILE=/etc/chilli.conf # upstream config file TEMPCONFIG=/tmp/chilli.conf ... # unpack upstream config zcat /usr/share/doc/chillispot/chilli.conf.gz > $TEMPCONFIG ... echo "NOTE:" echo "You have choosed to edit configuration by hand."; echo "A default configuration will be available on '/etc/chilli.conf'"; if [ ! -e $CONFIGFILE ]; then mv $TEMPCONFIG $CONFIGFILE else ucf $TEMPCONFIG $CONFIGFILE fi else ... -e "s/^(#)?uamhomepage.*/uamhomepage\ $uam_homepage/" \ -e "s/^(#)?uamsecret.*/uamsecret\ $uam_secret/" \ < $TEMPCONFIG > $tempfile if [ ! -e $CONFIGFILE ]; then mv $tempfile $CONFIGFILE else ucf $tempfile $CONFIGFILE fi 8<------------------------------------------>8 Putting a symlink in place can help nuking another file's content, or even modifying the program's config file to the attacker's will. Cheers, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html
signature.asc
Description: This is a digitally signed message part.