{"vuid":"VU#191675","idnumber":"191675","name":"/usr/libexec/vi.recover script contains vulnerability allowing arbitrary zero-length files to be removed","keywords":["/usr/libexec/vi.recover","vi.recover","zero-length files","OpenBSD"],"overview":"The /usr/libexec/vi.recover script in OpenBSD has a vulnerability that could allow an attacker to remove arbitrary zero-length files, including device nodes.","clean_desc":"The /usr/libexec/vi.recover script in OpenBSD cleans up vi temp files and informs a user via email if a recovery file exists for an aborted vi session. The vi.recover script is reported to contain an unspecified vulnerability that may allow the removal of arbitrary zero-length files, including device nodes. The vi.recover script in OpenBSD is a perl adaptation of a shell script from the nvi package, which is also reported to be vulnerable and may be present in other UNIX-based operating systems. This vulnerability is fixed in OpenBSD 3.1.","impact":"An attacker may be able to remove arbitrary zero-length files. This could allow a local attacker to cause a local denial of service by removing devices or files that enable services.","resolution":"Obtain a patch for your system from one the following URLs. For OpenBSD-2.9: ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch For OpenBSD-3.0: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/007_recover.patch","workarounds":"Another alternative is to remove /usr/libexec/vi.recover.","sysaffected":"","thanks":"Thanks to Todd C. Miller for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/007_recover.patch"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-11-15T17:42:04Z","publicdate":"2001-01-15T17:44:09Z","datefirstpublished":"2002-09-16T21:50:26Z","dateupdated":"2003-09-18T20:02:30Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.45","cam_scorecurrentwidelyknown":"0.5625","cam_scorecurrentwidelyknownexploited":"1.0125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.45,"vulnote":null}