Vulnerabilities > CVE-2005-3137 - Unspecified vulnerability in GNU Cfengine 1.6.5

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
local
low complexity
gnu
nessus

Summary

The (1) cfmailfilter and (2) cfcron.in files for cfengine 1.6.5 allow local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2005-2960.

Vulnerable Configurations

Part Description Count
Application
Gnu
1

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_8688D5CD328C11DAA2630001020EED82.NASL
    descriptionA Debian Security Advisory reports : Javier Fernandez-Sanguino Pena discovered several insecure temporary file uses in cfengine, a tool for configuring and maintaining networked machines, that can be exploited by a symlink attack to overwrite arbitrary files owned by the user executing cfengine, which is probably root.
    last seen2020-06-01
    modified2020-06-02
    plugin id21464
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21464
    titleFreeBSD : cfengine -- arbitrary file overwriting vulnerability (8688d5cd-328c-11da-a263-0001020eed82)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-184.NASL
    descriptionJavier Fern&aacute;ndez-Sanguino Pe&ntilde;a discovered several insecure temporary file uses in cfengine <= 1.6.5 and <= 2.1.16 which allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in. (CVE-2005-2960) In addition, Javier discovered the cfmailfilter and cfcron.in files for cfengine <= 1.6.5 allow local users to overwrite arbitrary files via a symlink attack on temporary files (CVE-2005-3137) The updated packages have been patched to address this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id20043
    published2005-10-19
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20043
    titleMandrake Linux Security Advisory : cfengine (MDKSA-2005:184)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-836.NASL
    descriptionJavier Fernandez-Sanguino Pena discovered insecure temporary file use in cfengine2, a tool for configuring and maintaining networked machines, that can be exploited by a symlink attack to overwrite arbitrary files owned by the user executing cfengine, which is probably root. The oldstable distribution (woody) is not affected by this problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id19805
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19805
    titleDebian DSA-836-1 : cfengine2 - insecure temporary files
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-198-1.NASL
    descriptionJavier Fernandez-Sanguino Pena discovered that several tools in the cfengine package (vicf, cfmailfilter, and cfcron) create and use temporary files in an insecure way. A local attacker could exploit this with a symlink attack to create or overwrite arbitrary files with the privileges of the user running the cfengine program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20612
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20612
    titleUbuntu 4.10 / 5.04 : cfengine vulnerabilities (USN-198-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-835.NASL
    descriptionJavier Fernandez-Sanguino Pena discovered several insecure temporary file uses in cfengine, a tool for configuring and maintaining networked machines, that can be exploited by a symlink attack to overwrite arbitrary files owned by the user executing cfengine, which is probably root.
    last seen2020-06-01
    modified2020-06-02
    plugin id19804
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19804
    titleDebian DSA-835-1 : cfengine - insecure temporary files