Website META Language: Insecure temporary file usage — GLSA 200803-23

Multiple insecure temporary file vulnerabilities have been discovered in the Website META Language.

Affected Packages

dev-lang/wml on all architectures
Affected versions < 2.0.11-r3
Unaffected versions >= 2.0.11-r3

Background

Website META Language is a free and extensible Webdesigner's off-line HTML generation toolkit for Unix.

Description

Temporary files are handled insecurely in the files wml_backend/p1_ipp/ipp.src, wml_contrib/wmg.cgi, and wml_backend/p3_eperl/eperl_sys.c, allowing users to overwrite or delete arbitrary files with the privileges of the user running the program.

Impact

Local users can exploit the insecure temporary file vulnerabilities via symlink attacks to perform certain actions with escalated privileges.

Workaround

Restrict access to the temporary directory to trusted users only.

Resolution

All Website META Language users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/wml-2.0.11-r3"

References

Release Date
March 15, 2008

Latest Revision
March 15, 2008: 01

Severity
normal

Exploitable
local

Bugzilla entries