[21629] in bugtraq

home help back first fref pref prev next nref lref last post

[SNS Advisory No.37] HTTProtect allows attackers to change the protected file using a symlink

daemon@ATHENA.MIT.EDU (snsadv@lac.co.jp)
Thu Jul 19 01:23:52 2001

To: bugtraq@securityfocus.com
From: "snsadv@lac.co.jp" <snsadv@lac.co.jp>
Message-Id: <200107191418.BHB65681.OEWTBT@lac.co.jp>
Date: Thu, 19 Jul 2001 14:18:44 +0900
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-2022-jp

-----------------------------------------------------------------------
SNS Advisory No.37
HTTProtect allows attackers to change the protected file using a symlink

Problem first discovered: Mon, 4 Jun 2001
Published: Wed, 18 Jul 2001
----------------------------------------------------------------------

Overview
---------
HTTProtect is a security product released by Omnisecure
(http://www.ominisecure.com) which prevents users from changing
and deleting file on the ext2 file system.

Even if attackers gain root privilege, it prevents them from
changing or deleting protected files.
But there is a problem which attackers can change protected files
bypassing the access-control.

Problem Description
-------------------
Even if attackers have the root privilege, protected files cannot
be changed, but they can change protected files under these conditions:

1.Attackers can make symlink in a writable directory(ex. /tmp)
2.They are the owner of the target file or they have root privilege.

example: (A protected file is /opt/www/html/index.html)
  $ ln -s /opt/www/html/index.html /tmp/foo
  $ vi /tmp/foo (cat /tmp/hack.html > /tmp/foo)

Tested Version
--------------
HTTProtect 1.1.1

Tested on
---------
RedHatLinux 6.2-J(Kernel 2.2.14-50)

Status of fixes
---------------
Patch is available on Omnisecure Web site now.
(http://www.omnisecure.com/products/http/Linux/1.1.1/index.htm)

Discovered by
-------------
 (TANIDA Fusao / LAC) tanida@lac.co.jp

Disclaimer
----------
  All information in these advisories are subject to change without any 
  advanced notices neither mutual consensus, and each of them is
  released as it is. LAC Co.,Ltd. is not responsible for any risks of
  occurrences caused by applying those information.

References
----------
  Archive of this advisory:
  http://www.lac.co.jp/security/english/snsadv_e/37_e.html

------------------------------------------------------------------
Secure Net Service(SNS) Security Advisory <snsadv@lac.co.jp>
Computer Security Laboratory, LAC  http://www.lac.co.jp/security/

home help back first fref pref prev next nref lref last post