copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2001.183 -- Debian Security Advisory DSA-053-1 -- nedit symlink attack

Date: 03 May 2001

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2001.183 -- Debian Security Advisory DSA-053-1
                           nedit symlink attack
                                3 May 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                nedit
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2
                        Linux
Platform:               alpha
                        arm
                        i386
                        m68k
                        powerpc
                        sparc
Impact:                 Overwrite Arbitrary Files

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-053-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
April 27, 2001
- - ------------------------------------------------------------------------


Package        : nedit
Problem type   : insecure temporary file
Debian-specific: no

The nedit (Nirvana editor) package as shipped in the non-free section
accompanying Debian GNU/Linux 2.2/potato had a bug in its printing code:
when printing text it would create a temporary file with the to be
printed text and pass that on to the print system. The temporary file
was not created safely, which could be exploited by an attacked to make
nedit overwrite arbitrary files.

This has been fixed in version 5.02-7.1.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02-7.1.diff.gz
      MD5 checksum: 82b90eea8263fd3f6140b40737f1fc16
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02-7.1.dsc
      MD5 checksum: e14d25693dab3e329a93bdca10a45f03
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02.orig.tar.gz
      MD5 checksum: 2d8d0a8ec173fde6d574ffef40bbc524

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-alpha/nedit_5.02-7.1_alpha.deb
      MD5 checksum: 18b921a22b20423e1e10ea599f8e98a3

  ARM architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-arm/nedit_5.02-7.1_arm.deb
      MD5 checksum: 748d639bc26e810a23fb4911b5a93da0

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-i386/nedit_5.02-7.1_i386.deb
      MD5 checksum: 1ad6fee0f55443820817b6a7e702afbf

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-m68k/nedit_5.02-7.1_m68k.deb
      MD5 checksum: eecbe4dd085e4d3588d1b1e2ce394af7

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-powerpc/nedit_5.02-7.1_powerpc.deb
      MD5 checksum: abb9cbbee1abf13ba7d7cbcc16caf07a

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-sparc/nedit_5.02-7.1_sparc.deb
      MD5 checksum: cc465ff49985a82cd150fb38f449f75b


  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- - -- 
- - ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOuihw6jZR/ntlUftAQG9QwL/aJ/aSrN/rBGfg3tg2Q5IxreH67klTWed
no439vZiR8ORJEJdW9rtYyqJt8rW0ZlVdG4QRATXXH8ibZuIYagttqurgFtlpHnc
rCu3FvKvNZvecfyAvYtM7F3/eFj1ZyS9
=Fq0C
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOvGBLCh9+71yA2DNAQE3kgP/coA2JDheGkApTUW0OWrDiBmuzn3Ounc3
vAwBbz9Tl4RjZ5a2XEFILAxHEOGTvtfEikheaWJY2xON0xeyEWjE3eWMlRNOVyWS
sZ3/PkA1XK0a/y+ZQqHbqrrXC2jJh6aI0Zy9+u+hN+Jt/9Ua0JdGw0ro0iLiAaHD
SC+2SE4T0jM=
=hI5m
-----END PGP SIGNATURE-----