Secunia Security Advisory - Jason Hoover has discovered a vulnerability in MigrationTools, which can be exploited by malicious, local users to disclose potentially sensitive information or to perform certain actions on a vulnerable system with escalated privileges. The vulnerability is caused due to the nis.$$.ldif temporary files being created insecurely in /tmp. This can be exploited via symlink attacks to overwrite arbitrary files with the privileges of the user running the migrate_all_online.sh script. The temporary files are world-readable are not deleted if ldapadd fails. This may disclose sensitive information such as users' password hashes. The vulnerability has been confirmed in version 46. Other versions may also be affected.
e69d45af74d3a29e2bf6c6fc22f2faa33798154c127002aacab0f6e615a37381
TITLE:
MigrationTools Insecure Temporary File Usage Vulnerability
SECUNIA ADVISORY ID:
SA17530
VERIFY ADVISORY:
http://secunia.com/advisories/17530/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
Local system
SOFTWARE:
MigrationTools
http://secunia.com/product/6114/
DESCRIPTION:
Jason Hoover has discovered a vulnerability in MigrationTools, which
can be exploited by malicious, local users to disclose potentially
sensitive information or to perform certain actions on a vulnerable
system with escalated privileges.
The vulnerability is caused due to the "nis.$$.ldif" temporary files
being created insecurely in "/tmp". This can be exploited via symlink
attacks to overwrite arbitrary files with the privileges of the user
running the "migrate_all_online.sh" script. The temporary files are
world-readable are not deleted if "ldapadd" fails. This may disclose
sensitive information such as users' password hashes.
The vulnerability has been confirmed in version 46. Other versions
may also be affected.
SOLUTION:
Grant only trusted users access to affected systems.
PROVIDED AND/OR DISCOVERED BY:
Jason Hoover
ORIGINAL ADVISORY:
Debian:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------