GLSA-200711-32 : Feynmf: Insecure temporary file creation

medium Nessus Plugin ID 28321

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200711-32 (Feynmf: Insecure temporary file creation)

Kevin B. McCarty discovered that the feynmf.pl script creates a temporary 'properly list' file at the location '$TMPDIR/feynmf$PID.pl', where $PID is the process ID.
Impact :

A local attacker could create symbolic links in the directory where the temporary files are written, pointing to a valid file somewhere on the filesystem that is writable by the user running Feynmf. When Feynmf writes the temporary file, the target valid file would then be overwritten with the contents of the Feynmf temporary file.
Workaround :

There is no known workaround at this time.

Solution

All Feynmf users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-tex/feynmf-1.08-r2'

See Also

http://www.gentoo.org/security/en/glsa/glsa-200711-32.xml

Plugin Details

Severity: Medium

ID: 28321

File Name: gentoo_GLSA-200711-32.nasl

Version: 1.16

Type: local

Published: 11/26/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:feynmf, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 11/20/2007

Reference Information

CVE: CVE-2007-5940

CWE: 59

GLSA: 200711-32