CERTA-2004-AVI-233

Vulnerability from certfr_avis - Published: - Updated:

None

Description

Shorewall est une interface qui permet la configuration du firewall netfilter.

Une vulnérabilité dans le code chargé de la création des fichiers et des répertoires temporaires permet à un utilisateur mal intentionné, via des liens symboliques habilement construits, d'écraser des fichiers arbitraires avec les privilèges du processus Shorewall.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

La version 1.4.10f corrige cette vulnérabilité.

Shorewall version 1.4.10c et versions antérieures.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eShorewall version 1.4.10c et versions  ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nShorewall est une interface qui permet la configuration du firewall\nnetfilter.\n\nUne vuln\u00e9rabilit\u00e9 dans le code charg\u00e9 de la cr\u00e9ation des fichiers et des\nr\u00e9pertoires temporaires permet \u00e0 un utilisateur mal intentionn\u00e9, via des\nliens symboliques habilement construits, d\u0027\u00e9craser des fichiers\narbitraires avec les privil\u00e8ges du processus Shorewall.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).  \n\nLa version 1.4.10f corrige cette vuln\u00e9rabilit\u00e9.\n",
  "cves": [],
  "links": [
    {
      "title": "Annonce sur la liste de diffusion Shorewall du 28 juin 2004    :",
      "url": "http://lists.shorewall.net/pipermail/shorewall-announce/2004-June/000385.html"
    }
  ],
  "reference": "CERTA-2004-AVI-233",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-07-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans Shorewall",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200407-07",
      "url": "http://security.gentoo.org/glsa/glsa-200407-07.xml"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…