{"vuid":"VU#396272","idnumber":"396272","name":"mgetty creates temporary files insecurely","keywords":["mgetty","race","symlink","temporary","tmp"],"overview":"mgetty, a replacement for getty designed to support modem and fax use, creates files of a predictable name in a world-writable directory without checking for the prior existence or ownership of the file. Using a symbolic link attack, an intruder might cause the overwrite of arbitrary files on the system, but the risk of elevated privileges is low.","clean_desc":"mgetty uses the faxrunq service to process faxes. This involves use of the world-writable /var/spool/fax/outgoing/ directory to store temporary files. These temporary files are created without checking for prior existence or ownership of the files.","impact":"By creating a symbolic link named '.last_run' and pointing towards any existing file, an attacker can cause mgetty to overwrite the file. Since the attacker cannot control the content of the overwritten file, the risk of exploiting this for elevated privileges is low.","resolution":"Apply vendor patches; see the Systems Affected section below.","workarounds":"Disable the faxrunq service.","sysaffected":"","thanks":"This vulnerability was first identified by Greg Kroah-Hartman of Immunix.","author":"This document was last changed by Tim Shimeall.","public":["http://www.securityfocus.com/bid/2187","http://www.caldera.com/support/security/advisories/CSSA-2001-002.0.txt","http://www.linuxsecurity.com/advisories/caldera_advisory-1059.html","http://lists.debian.org/debian-security-announce/debian-security-announce-2001/msg00000.html","http://www.linuxsecurity.com/advisories/debian_advisory-1184.html","ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:71.mgetty.asc","http://www.linuxsecurity.com/advisories/freebsd_advisory-894.html","http://www.redhat.com/support/errata/RHSA-2001-050.html","http://www.linuxsecurity.com/advisories/redhat_advisory-1321.html","http://www.linux-mandrake.com/en/updates/2001/MDKSA-2001-009.php3?dis=6.1","http://www.linuxsecurity.com/advisories/other_advisory-1034.html"],"cveids":["CVE-2001-0141"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-12T18:27:55Z","publicdate":"2001-01-10T00:00:00Z","datefirstpublished":"2001-10-01T17:09:21Z","dateupdated":"2001-11-08T18:10:04Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.125","cam_scorecurrentwidelyknown":"1.40625","cam_scorecurrentwidelyknownexploited":"2.53125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.125,"vulnote":null}