Vulnerabilities > CVE-2005-2918 - Unspecified vulnerability in Gtkdiskfree
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gtkdiskfree
nessus
Summary
The open_cmd_tube function in mount.c for gtkdiskfree 1.9.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the gtkdiskfree temporary file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200510-01.NASL description The remote host is affected by the vulnerability described in GLSA-200510-01 (gtkdiskfree: Insecure temporary file creation) Eric Romang discovered that gtkdiskfree insecurely creates a predictable temporary file to handle command output. Impact : A local attacker could create a symbolic link in the temporary files directory, pointing to a valid file somewhere on the filesystem. When gtkdiskfree is executed, this would result in the file being overwritten with the rights of the user running the application. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 19821 published 2005-10-05 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19821 title GLSA-200510-01 : gtkdiskfree: Insecure temporary file creation NASL family Debian Local Security Checks NASL id DEBIAN_DSA-822.NASL description Eric Romang discovered that gtkdiskfree, a GNOME program that shows free and used space on filesystems, creates a temporary file in an insecure fashion. last seen 2020-06-01 modified 2020-06-02 plugin id 19791 published 2005-10-05 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19791 title Debian DSA-822-1 : gtkdiskfree - insecure temporary file creation
References
- http://bugs.gentoo.org/show_bug.cgi?id=104565
- http://bugs.gentoo.org/show_bug.cgi?id=104565
- http://marc.info/?l=bugtraq&m=112680706715109&w=2
- http://marc.info/?l=bugtraq&m=112680706715109&w=2
- http://secunia.com/advisories/16951
- http://secunia.com/advisories/16951
- http://secunia.com/advisories/17005
- http://secunia.com/advisories/17005
- http://secunia.com/advisories/17056
- http://secunia.com/advisories/17056
- http://www.debian.org/security/2005/dsa-822
- http://www.debian.org/security/2005/dsa-822
- http://www.gentoo.org/security/en/glsa/glsa-200510-01.xml
- http://www.gentoo.org/security/en/glsa/glsa-200510-01.xml
- http://www.zataz.net/adviso/gtkdiskfree-09052005.txt
- http://www.zataz.net/adviso/gtkdiskfree-09052005.txt