An insecure temporary file usage has been reported in Openswan, allowing for symlink attacks.
Package | net-misc/openswan on all architectures |
---|---|
Affected versions | < 2.4.13-r2 |
Unaffected versions | >= 2.4.13-r2 |
Openswan is an implementation of IPsec for Linux.
Dmitry E. Oboukhov reported that the IPSEC livetest tool does not handle the ipseclive.conn and ipsec.olts.remote.log temporary files securely.
A local attacker could perform symlink attacks to execute arbitrary code and overwrite arbitrary files with the privileges of the user running the application.
There is no known workaround at this time.
All Openswan users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.13-r2"
Release date
March 09, 2009
Latest revision
March 09, 2009: 01
Severity
normal
Exploitable
local
Bugzilla entries