Package: webalizer
Version: 2.01.10-26
Severity: critical
Justification: root security hole

I have identified a symlink vulnerability in Webalizer, which potentially 
allows an unprivileged user to cause a root-owned file to be overwritten. The 
vulnerability occurs if the user has write permission to the directory into 
which Webalizer will write its output, and Webalizer is run as a more 
privileged user (e.g. as root, from a system-wide cron job); a user can 
create a symlink from any of the filenames Webalizer writes (e.g. index.html) 
to any other file on the system, and Webalizer will write to the symlink's 
target.

The attacker may also have some control over the contents with which the 
symlink's target will be overwritten, by making specially-crafted HTTP 
requests which will be written into the log file being parsed; some of the 
HTML files output by Webalizer contain strings pulled from the input log file.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686-smp
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages webalizer depends on:
ii  debconf                1.4.30.13         Debian configuration management sy
ii  libc6                  2.3.2.ds1-22      GNU C Library: Shared libraries an
ii  libdb4.2               4.2.52-18         Berkeley v4.2 Database Libraries [
ii  libgd2-xpm             2.0.33-1.1        GD Graphics Library version 2
ii  libpng12-0             1.2.8rel-1        PNG library - runtime
ii  zlib1g                 1:1.2.2-4.sarge.2 compression library - runtime

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to