Bug#453239: scanbuttond: CVE-2007-6131 possible symlink attack

2007-11-28 Thread Nico Golde
Hi Milan, * Milan Zamazal <[EMAIL PROTECTED]> [2007-11-28 21:03]: > Well, the buttonpressed.sh script is clearly intended just as a piece of > documentation with quick tips for systems without untrusted users > (typically home computers). A system administrator who would just > blindly uncomment t

Bug#453239: scanbuttond: CVE-2007-6131 possible symlink attack

2007-11-28 Thread Milan Zamazal
Well, the buttonpressed.sh script is clearly intended just as a piece of documentation with quick tips for systems without untrusted users (typically home computers). A system administrator who would just blindly uncomment the examples on a server with common user accounts should better spend his

Bug#453239: scanbuttond: CVE-2007-6131 possible symlink attack

2007-11-28 Thread Tomas Hoger
Hi! From my previous mail regarding this issue sent elsewhere: This issue may not affect other vendors. From quick look over Debian/Ubuntu packages, they do not seem affected, as default buttonpressed.sh script has almost all content commented out (just a template / example) and daemon d

Bug#453239: scanbuttond: CVE-2007-6131 possible symlink attack

2007-11-27 Thread Nico Golde
Package: scanbuttond Severity: 0.2.3-4 Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for scanbuttond. CVE-2007-6131[0]: | buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite | arbitrary files via a symlink attack on the (1) scan.pnm a