{"vuid":"VU#35842","idnumber":"35842","name":"man 'makewhatis' insecurely uses /tmp","keywords":["linux","makewhatis","tmp","man"],"overview":"The 'makewhatis' script in the Linux man package allows local users to overwrite files via a symlink attack.","clean_desc":"The 'makewhatis' program is a Bourne shell script that ships with many Linux distributions in the 'man' package of programs. The 'makewhatis' script creates files in the /tmp directory with predictable names. By using various symlink attacks, it is possible for local users to exploit this predictability to create or modify arbitrary files and gain elevated privilege. In addition, the 'makewhatis' script is run daily to rebuild the database used by the 'whatis' command. Local users may be able to read any system file by forcing a copy of it into the 'whatis' database. The man package version 1.5e and higher is vulnerable to this flaw.","impact":"Many distributions of Linux contain the 'man' package. The vulnerability in 'makewhatis' can be exploited by local users to corrupt privileged (root) files on the system or to gain elevated privileges.","resolution":"Versions of Linux in affected distributions should be upgraded.","workarounds":"","sysaffected":"","thanks":"Thanks to Red Hat for the information contained in their security advisory.","author":"This document was written by Andrew P. Moore.","public":["http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0566","http://www.securityfocus.com/bid/1434","http://www.redhat.com/support/errata/RHSA-2000-041-02.html","http://www.caldera.com/support/security/advisories/CSSA-2000-021.0.txt","http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-015.php3?dis=6.0"],"cveids":["CVE-2000-0566"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-07-11T17:09:49Z","publicdate":"2000-07-03T00:00:00Z","datefirstpublished":"2001-06-18T17:24:41Z","dateupdated":"2001-06-18T17:24:48Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"5","cam_scorecurrent":"3.0375","cam_scorecurrentwidelyknown":"3.88125","cam_scorecurrentwidelyknownexploited":"7.25625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.0375,"vulnote":null}