Package: fidogate
Version: 4.4.7-2
Severity: grave
Tags: security

Neils Heinen found that a local attacker can use setuid programs
installed as part of fidogate to create or append to files with the
privileges of the `ftn' user.  Binaries ffx, ftnafmail, and rfc2ftn
will open any file specified by the LOGFILE or FIDOGATE_LOGFILE
environment variable.

fidogate 4.4.10 fixes this by removing the vulnerable code (patch
below).

To reproduce:

    $ ls -l /tmp/example
    ls: /tmp/example: No such file or directory
    $ LOGFILE=/tmp/example /usr/lib/fidogate/ffx
    $ ls -l /tmp/example
    -rw-r--r-- 1 ftn users 99 Aug 13 19:05 /tmp/example

References:

    <http://www.securityfocus.com/bid/11005>
    <http://securitytracker.com/id?1011021>

Thanks,

Matej
Index: fidogate/src/common/log.c
===================================================================
RCS file: /cvsroot/fidogate/fidogate/src/common/log.c,v
retrieving revision 4.21
retrieving revision 4.22
diff -u -b -I\$Id -r4.21 -r4.22
--- fidogate/src/common/log.c   16 Feb 2003 15:38:56 -0000      4.21
+++ fidogate/src/common/log.c   20 Aug 2004 21:21:39 -0000      4.22
@@ -280,8 +280,10 @@
     
     BUF_COPY(logprog, name);
 
+#if 0 /**NOT NEEDED AND SECURITY RISK**/
     if( (p = getenv("LOGFILE")) )
        log_file(p);
     if( (p = getenv("FIDOGATE_LOGFILE")) )
        log_file(p);
+#endif
 }

Reply via email to