oss-sec mailing list archives
Re: CVE Request - glib symlink copying permission exposure
From: "Steven M. Christey" <coley () linus mitre org>
Date: Tue, 22 Sep 2009 03:22:03 -0400 (EDT)
====================================================== Name: CVE-2009-3289 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3289 Reference: MLIST:[oss-security] 20090908 CVE Request - glib symlink copying permission exposure Reference: URL:http://www.openwall.com/lists/oss-security/2009/09/08/8 Reference: MISC:https://bugzilla.gnome.org/show_bug.cgi?id=593406 Reference: CONFIRM:https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135 The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Current thread:
- CVE Request - glib symlink copying permission exposure Kees Cook (Sep 08)
- Re: CVE Request - glib symlink copying permission exposure Steven M. Christey (Sep 22)