what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

freebsd.sa-00.06.htdig

freebsd.sa-00.06.htdig
Posted Mar 1, 2000
Site freebsd.org

FreeBSD Security Advisory - There is a security hole in the htsearch cgi-bin program for versions of htdig prior to 3.1.5, which allows remote users to read any file on the local system that is accessible to the user ID running htsearch.

tags | remote, local, cgi
systems | freebsd
SHA-256 | 8430ae118e415cfb666f01a0ab93488717e4692293630520a1c0eb7551d96892

freebsd.sa-00.06.htdig

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
FreeBSD-SA-00:06 Security Advisory
FreeBSD, Inc.

Topic: htdig port allows remote reading of files

Category: ports
Module: htdig
Announced: 2000-03-01
Affects: Ports collection before the correction date.
Corrected: 2000-02-28
FreeBSD only: NO

I. Background

The ht://Dig system is a complete world wide web indexing and searching
system for a small domain or intranet.

II. Problem Description

There is a security hole in the htsearch cgi-bin program for versions of
htdig prior to 3.1.5, which allows remote users to read any file on the
local system that is accessible to the user ID running htsearch (usually
the user ID running the webserver process, user 'nobody' in the default
installation of apache).

Note that the htdig utility is not installed by default, nor is it "part
of FreeBSD" as such: it is part of the FreeBSD ports collection, which
contains over 3100 third-party applications in a ready-to-install format.

FreeBSD makes no claim about the security of these third-party
applications, although an effort is underway to provide a security audit
of the most security-critical ports.

III. Impact

If you have not chosen to install the htdig port/package, then your system
is not vulnerable. If you have, then local or remote users who can connect
to a web server which contains the htsearch cgi-bin executable can read
any file on your system which is accessible to the user running the
htsearch process (typically user nobody). It is not currently believed
that an attacker can exploit this hole to modify or delete files, but they
may be able to use the ability to read files to mount a further attack
based on other security holes they discover.

IV. Workaround

Remove the /usr/local/share/apache/cgi-bin/htsearch file, if you do not
make use of it.

V. Solution

One of the following:

1) Upgrade your entire ports collection and rebuild the htdig port.

2) Reinstall a new package obtained from:

ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/textproc/htdig-3.1.5.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/textproc/htdig-3.1.5.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/textproc/htdig-3.1.5.tgz

(Note: it may be several days before the new packages appear on the FTP
site)

3) download a new port skeleton for the htdig port from:

http://www.freebsd.org/ports/

and use it to rebuild the port.

4) Use the portcheckout utility to automate option (3) above. The
portcheckout port is available in /usr/ports/devel/portcheckout or the
package can be obtained from:

ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/devel/portcheckout-2.0.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/devel/portcheckout-2.0.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/devel/portcheckout-2.0.tgz

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBOL1um1UuHi5z0oilAQGtnwP+JsTP4KCrAO/fEIMG70a79tPsLeqUiuyP
ihPc5Rw/e6wguW8qPLXvLGSsT5zzkXLOeuww+2ViPpYehTkD4cB1zt3UsWeNSGa+
kkWQyYFwK/3BaHbsN8COu4xa5c4B+VdqbFXa3G/cIM+MRRTxlhrDWqaJp58UKpD3
OA7HcbSdSKk=
=A+Nm
-----END PGP SIGNATURE-----


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security-notifications" in the body of the message

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close