Linux Today: Linux News On Internet Time.

EnGarde Secure Linux Security Advisory: AllCommerce insecure temporary files

Jul 11, 2001, 21:47 (0 Talkback[s])
Date: Wed, 11 Jul 2001 13:40:35 -0400 (EDT)
From: EnGarde Secure Linux <security@guardiandigital.com>
Subject: [ESA-20010711-01]  AllCommerce insecure temporary files

| EnGarde Secure Linux Security Advisory                   July 11, 2001 |
| http://www.engardelinux.org/                           ESA-20010711-01 |
|                                                                        |
| Package:  AllCommerce                                                  |
| Summary:  AllCommerce creates insecure temporary files.                |

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.

- --------
  There is a temporary file creation vulnerability in AllCommerce which
  can allow an attacker to exploit a victim via a symlink attack as the
  'webd' user.

- ------
  Our AllCommerce packages were released with several debugging options
  enabled.  This, unfortunately, leads to the creation of several insecure
  files in the /tmp directory.  These files have predictable names and
  are thus subject to a symlink attack as the 'webd' user.

  Debugging is totally disabled in this update so no files should be
  created in /tmp.  All users are urged to update to this latest package.

- --------
  All users should upgrade to the most recent version, as outlined in
  this advisory.

  Guardian Digital recently made available the Guardian Digital Secure
  Update, a means to proactively keep systems secure and manage
  system software. EnGarde users can automatically update their system
  using the Guardian Digital WebTool secure interface.

  If choosing to manually upgrade this package, updates can be
  obtained from:


  Before upgrading the package, the machine must either:

    a) be booted into a "standard" kernel; or
    b) have LIDS disabled.

  To disable LIDS, execute the command:

    # /sbin/lidsadm -S -- -LIDS_GLOBAL

  To install the updated package, execute the command:

    # rpm -Uvh <filename>

  To re-enable LIDS (if it was disabled), execute the command:

    # /sbin/lidsadm -S -- +LIDS_GLOBAL

  To verify the signature of the updated packages, execute the command:

    # rpm -Kv <filename>

- ----------------
  These updated packages are for EnGarde Secure Linux 1.0.1 (Finestra).

  Source Packages:

      MD5 Sum:  7d4a528a1c72fbf11ffa6279db0122d2

  Binary Packages:

      MD5 Sum:  9f60b894068f946757b6ca127672b3d9

- ----------

  Guardian Digital's public key:

  Credit for the discovery of this bug goes to:
    Ryan W. Maple <ryan@guardiandigital.com>

  AllCommerce's Official Web Site:

  Security Contact:    security@guardiandigital.com
  EnGarde Advisories:  http://www.engardelinux.org/advisories.html

- --------------------------------------------------------------------------
$Id: ESA-20010711-01-AllCommerce,v 1.7 2001/07/11 16:56:28 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple, <ryan@guardiandigital.com>
Copyright 2001, Guardian Digital, Inc.