[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] tcsh symlink vulnerability



Topic
=====
Symlink attack in tcsh.

Problem Description
===================
When using in-here documents using the << syntax tcsh uses a temporary file to
store the data. Unfortunately the temporary file is not created securely and
standard symlink attacks can be used to make tcsh overwrite arbitrary files. 

Affected Systems
================
All systems with tcsh versions < 6.10.

Solution
========
upgrade to version 6.10

RedHat 6.x
-----------
rpm -Fvh tcsh-6.10-0.6.x.i386.rpm

RedHat 7.0
----------
rpm -Fvh tcsh-6.10-1.i386.rpm

Caldera
-------
rpm -Fvh tcsh-6.10.00-2.i386.rpm tcsh-doc-html-6.10.00-2.i386.rpm

Mandrake 6.x, 7.0, 7.1
----------------------
rpm -Fvh tcsh-6.09.04-1.2mdk.i586.rpm

Mandrake 7.2
------------
rpm -Fvh tcsh-6.09.04-1.1mdk.i586.rpm

Debian 2.2 (potato)
-------------------
upgrade to tcsh_6.09.00-10_i386.deb and/or tcsh-kanji_6.09.00-10_i386.deb