{"vuid":"VU#349019","idnumber":"349019","name":"Tripwire vulnerable to arbitrary file overwriting via symlink redirection of temporary file","keywords":["Tripwire","temporary files","/tmp","symbolic link","symlink"],"overview":"Tripwire is a file integrity verification utility for Unix and Linux operating systems. In some implementations, tripwire opens insecure temporary files with predictable names in publically-writable directories. Using a symbolic link attack, a local intruder may overwrite or create arbitrary files on machines running tripwire.","clean_desc":"Tripwire opens temporary files in /tmp using predictable names without first checking for prior existence or ownership of these files. The files are opened when building or updating tripwire's database of file checksums.","impact":"By creating symbolic links with appropriate names within a very tight time window, a local attacker may be able to redirect the data sent to the temporary file to arbitrary files on machines running tripwire. Since tripwire normally is executed by the system administrator, file protections will not apply. The file overwrite may result in disabling of system services, crashing the machine, or disabling of system protections.","resolution":"Apply vendor patches; see the Systems Affected section below.","workarounds":"Clear /tmp prior to execution of tripwire.","sysaffected":"","thanks":"This vulnerability was first discovered by Jamo Huuskonen.","author":"This document was last modified by Tim Shimeall.","public":["http://sourceforge.net/projects/tripwire/","http://www.tripwire.com","http://securityfocus.com/bid/3003","http://www.linuxsecurity.com/advisories/mandrake_advisory-1502.html"],"cveids":["CVE-2001-0774"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-10T13:19:19Z","publicdate":"2001-07-09T00:00:00Z","datefirstpublished":"2001-11-15T16:25:39Z","dateupdated":"2001-11-15T16:25:41Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"14","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.85","cam_scorecurrentwidelyknown":"6.6","cam_scorecurrentwidelyknownexploited":"8.1","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.85,"vulnote":null}