Package: chillispot
Version: 1.0-9
Severity: grave
Tags: security

From postinst:

8<------------------------------------------>8
# config file
CONFIGFILE=/etc/chilli.conf
# upstream config file
TEMPCONFIG=/tmp/chilli.conf
...
# unpack upstream config
zcat /usr/share/doc/chillispot/chilli.conf.gz > $TEMPCONFIG
...
         echo "NOTE:"
         echo "You have choosed to edit configuration by hand.";
         echo "A default configuration will be available on '/etc/chilli.conf'";

         if [ ! -e $CONFIGFILE ]; then
                  mv $TEMPCONFIG $CONFIGFILE
         else
                  ucf $TEMPCONFIG $CONFIGFILE
         fi
else
...
        -e "s/^(#)?uamhomepage.*/uamhomepage\ $uam_homepage/" \
        -e "s/^(#)?uamsecret.*/uamsecret\ $uam_secret/" \
                  < $TEMPCONFIG > $tempfile

         if [ ! -e $CONFIGFILE ]; then
                  mv $tempfile $CONFIGFILE
         else
                  ucf $tempfile $CONFIGFILE
         fi
8<------------------------------------------>8


Putting a symlink in place can help nuking another file's content, or even 
modifying the program's config file to the attacker's will.

Cheers,
-- 
Atomo64 - Raphael

Please avoid sending me Word, PowerPoint or Excel attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to