Multiple insecure temporary file vulnerabilities have been discovered in the Website META Language.
|Package||dev-lang/wml on all architectures|
|Affected versions||< 2.0.11-r3|
|Unaffected versions||>= 2.0.11-r3|
Website META Language is a free and extensible Webdesigner's off-line HTML generation toolkit for Unix.
Temporary files are handled insecurely in the files wml_backend/p1_ipp/ipp.src, wml_contrib/wmg.cgi, and wml_backend/p3_eperl/eperl_sys.c, allowing users to overwrite or delete arbitrary files with the privileges of the user running the program.
Local users can exploit the insecure temporary file vulnerabilities via symlink attacks to perform certain actions with escalated privileges.
Restrict access to the temporary directory to trusted users only.
All Website META Language users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/wml-2.0.11-r3"
March 15, 2008
March 15, 2008: 01