bogofilter-sa-2002-01
来自「一个C语言写的快速贝叶斯垃圾邮件过滤工具」· 代码 · 共 97 行
TXT
97 行
This security announcement is kept for historic reasons. The softwarethat was found to be vulnerable no longer ships with bogofilter.-----------------------------------------------------------------------bogofilter-SA-2002:01.bogopassTopic: vulnerability in bogopassAnnouncement: bogofilter-SA-2002:01Writer: Matthias AndreeVersion: 1.00Announced: 2002-11-29Category: contribType: temporary file created insecurelyImpact: anonymous local file destruction or changeCredits: -Danger: medium (the vulnerable version was replaced after 6 hours, the vulnerable program is not installed by default)Bugtraq ID: 6278URL: http://bogofilter.sourceforge.net/security/bogofilter-SA-2002-01Affects: bogofilter 0.9.0.4 (beta version)Not affected: bogofilter 0.9.0.3 and before bogofilter 0.9.0.5 and newerDefault install: unaffected.Introduced: 2002-11-27 23:04:28 UTC (CVS) 2002-11-27 23:11 bogofilter 0.9.0.4 releasedCorrected: 2002-11-28 01:19:04 UTC (CVS) - disabled original version 2002-11-28 03:32:47 UTC (CVS) - committed corrected version 2002-11-28 04:26 bogofilter 0.9.0.5 released0. Release history2002-11-28 1.00 initial announcement2004-10-28 added Bugtraq ID2004-10-30 added URL1. BackgroundBogofilter is a software package to determine if a mail on its standardinput is spam or not.2. Problem descriptionA vulnerability was found in the contrib/bogopass Perl program that wasadded to bogofilter as of the 0.9.0.4 beta release (date: 2002-11-2723:04:28 UTC in CVS) with bogofilter, but is not installed by default.The bogopass program creates temporary files with the name/tmp/bogopass.$$, where $$ is the process ID, with the open FH, ">file"syntax of Perl, which uses O_TRUNC mode, not O_EXCL.3. ImpactThis vulnerability allows for anonymous file destruction or change, andmight be abused to further escalate the privileges of the localattacker.If bogopass is run by the root user, this may eventually lead to acomplete system compromise.4. WorkaroundDo not install or use the "bogopass" program that shipped with thevulnerable versions (see above) of bogofilter.5. SolutionUpgrade your bogofilter to version 0.9.0.5 beta, and reinstall thebogopass program. Make sure you delete all copies of the old version ofbogopass.bogofilter 0.9.0.5 is available from sourceforge:http://sourceforge.net/project/showfiles.php?group_id=62265&release_id=1187946. Solution detailsrevision 1.3date: 2002/11/28 03:32:47; author: m-a; state: Exp; lines: +67 -267. Other hintsSoftware that treats user input should not run as root if it can beavoided. When installing bogofilter for system-wide use, make sure thatit runs as an unprivileged user to limit the impact of possiblevulnerabilities.A. Referencesbogofilter home page: http://bogofilter.sourceforge.net/
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?