[19330] in bugtraq

home help back first fref pref prev next nref lref last post

Re: HeliSec: StarOffice symlink exploit

daemon@ATHENA.MIT.EDU (Christian)
Thu Feb 22 13:22:17 2001

Mail-Followup-To: JeT Li <jet_li_man@yahoo.com>, BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20010222115051.A8880@diffie.it.murdoch.edu.au>
Date:         Thu, 22 Feb 2001 11:50:51 +0800
Reply-To: Christian <christian@dijkstra.MURDOCH.EDU.AU>
From: Christian <christian@dijkstra.MURDOCH.EDU.AU>
X-To:         JeT Li <jet_li_man@yahoo.com>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <01021717035200.05311@JeT-Li>; from jet_li_man@yahoo.com on Sat,
              Feb 17, 2001 at 04:57:23PM +0100

On Sat, Feb 17, 2001 at 04:57:23PM +0100, JeT Li wrote:

> 	StarOffice creates a temporary directory in /tmp called soffice.tmp,
> with permissions 0777. Into this directory other temporary files are creates,
> with the format: svZZZZ.tmp, where ZZZZ in a four or five digits number.

<snip>

I reported this problem to BUGTRAQ on November 8, 2000.  See
http://www.securityfocus.com/bid/1922 for more details.  I believe Sun
has now released patches for this issue.  It always helps to do a search
before reporting a "new" vulnerability. :-)

Regards,

Christian.

home help back first fref pref prev next nref lref last post