Vulnerabilities > CVE-2004-0233 - Local vulnerability in UTempter

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
local
low complexity
sgi
utempter
slackware
nessus
exploit available

Summary

Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.

Exploit-Db

descriptionUTempter 0.5.x Multiple Local Vulnerabilities. CVE-2004-0233. Local exploit for linux platform
idEDB-ID:24027
last seen2016-02-02
modified2004-04-19
published2004-04-19
reporterSteve Grubb
sourcehttps://www.exploit-db.com/download/24027/
titleUTempter 0.5.x - Multiple Local Vulnerabilities

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200405-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200405-05 (Utempter symlink vulnerability) Utempter contains a vulnerability that may allow local users to overwrite arbitrary files via a symlink attack. Impact : This vulnerability may allow arbitrary files to be overwritten with root privileges. Workaround : There is no known workaround at this time. All users are advised to upgrade to the latest available version of utempter.
    last seen2020-06-01
    modified2020-06-02
    plugin id14491
    published2004-08-30
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14491
    titleGLSA-200405-05 : Utempter symlink vulnerability
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2004-031.NASL
    descriptionSteve Grubb discovered two potential issues in the utempter program : 1) If the path to the device contained /../ or /./ or //, the program was not exiting as it should. It would be possible to use something like /dev/../tmp/tty0, and then if /tmp/tty0 were deleted and symlinked to another important file, programs that have root privileges that do no further validation can then overwrite whatever the symlink pointed to. 2) Several calls to strncpy without a manual termination of the string. This would most likely crash utempter. The updated packages are patched to correct these problems. Update : The second portion of the patch to address the manual termination of the string has been determined to be uneccessary, as well as reducing the length of utmp strings by one character. As such, it has been removed.
    last seen2020-06-01
    modified2020-06-02
    plugin id14130
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14130
    titleMandrake Linux Security Advisory : utempter (MDKSA-2004:031-1)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2004-110-01.NASL
    descriptionNew utempter packages are available for Slackware 9.1 and -current to fix a security issue. (Slackware 9.1 was the first version of Slackware to use the libutempter library, and earlier versions of Slackware are not affected by this issue) The utempter package provides a utility and shared library that allows terminal applications such as xterm and screen to update /var/run/utmp and /var/log/wtmp without requiring root privileges. Steve Grubb has identified an issue with utempter-0.5.2 where under certain circumstances an attacker could cause it to overwrite files through a symlink. This has been addressed by upgrading the utempter package to use Dmitry V. Levin
    last seen2020-06-01
    modified2020-06-02
    plugin id18769
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18769
    titleSlackware 9.1 / current : utempter security update (SSA:2004-110-01)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2004-174.NASL
    descriptionAn updated utempter package that fixes a potential symlink vulnerability is now available. Utempter is a utility that allows terminal applications such as xterm and screen to update utmp and wtmp without requiring root privileges. Steve Grubb discovered a flaw in Utempter which allowed device names containing directory traversal sequences such as
    last seen2020-06-01
    modified2020-06-02
    plugin id12490
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12490
    titleRHEL 2.1 / 3 : utempter (RHSA-2004:174)

Oval

  • accepted2013-04-29T04:01:51.280-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    descriptionUtempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
    familyunix
    idoval:org.mitre.oval:def:10115
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleUtempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
    version27
  • accepted2004-07-12T12:00:00.000-04:00
    classvulnerability
    contributors
    nameJay Beale
    organizationBastille Linux
    descriptionUtempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
    familyunix
    idoval:org.mitre.oval:def:979
    statusaccepted
    submitted2004-06-10T12:00:00.000-04:00
    titleUtempter Directory Traversal Vulnerability
    version3

Redhat

advisories
  • rhsa
    idRHSA-2004:174
  • rhsa
    idRHSA-2004:175
rpms
  • utempter-0:0.5.5-1.3EL.0
  • utempter-debuginfo-0:0.5.5-1.3EL.0