{"vuid":"VU#570952","idnumber":"570952","name":"Redhat Linux diskcheck.pl creates predictable temporary file and fails to check for existing symbolic link of same name","keywords":["Redhat","diskcheck.pl","PERL","race","symlink","tmp","diskusagealert.txt"],"overview":"Diskcheck.pl is a PERL script, part of Red Hat's powertools suite, that alerts a system administrator if any file system approaches capacity. In creating email alerts, diskcheck.pl creates insecure temporary files in a world-writable directory, which may permit an attacker to corrupt any writable file on the system.","clean_desc":"Diskcheck.pl is designed to run hourly. When any file system approaches capacity, it generates an email message to the system administrator, using a temporary file with a predictable name in the /tmp directory, without checking for the prior existence or ownership of this file. By its nature, Disckcheck runs with setuid root.","impact":"By creating a symbolic link with appropriate name and pointed to any writable file on the system, a local attacker can corrupt that file when diskcheck detects a file system approaching capacity.","resolution":"Apply vendor patches; see the Systems Affected section below.","workarounds":"Modify diskcheck.pl to remove any file from /tmp named for its temporary file.","sysaffected":"","thanks":"This vulnerability was first announced by Stan Bubrouski .","author":"This document was last modified by Tim Shimeall.","public":["http://www.securityfocus.com/bid/2050","http://www.linuxsecurity.com/advisories/redhat_advisory-955.html"],"cveids":["CVE-2000-0715"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-12-20T23:10:44Z","publicdate":"2000-12-20T00:00:00Z","datefirstpublished":"2001-10-08T16:57:55Z","dateupdated":"2001-10-08T16:59:58Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"7","cam_population":"9","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"4.32","cam_scorecurrentwidelyknown":"4.995","cam_scorecurrentwidelyknownexploited":"6.345","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.32,"vulnote":null}