[18340] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris patchadd(1) (3) symlink vulnerabilty

daemon@ATHENA.MIT.EDU (Paul Szabo)
Sun Dec 24 19:10:01 2000

Message-ID:  <200012222017.HAA21452@milan.maths.usyd.edu.au>
Date:         Sat, 23 Dec 2000 07:17:26 +1100
Reply-To: Paul Szabo <psz@MATHS.USYD.EDU.AU>
From: Paul Szabo <psz@MATHS.USYD.EDU.AU>
X-To:         Darren.Moffat@eng.sun.com
To: BUGTRAQ@SECURITYFOCUS.COM

Darren Moffat <Darren.Moffat@ENG.SUN.COM> wrote:

> Since patchadd is a script the bug it pretty easy to fix...
> So here is a set of diffs to patchadd for those that really can't wait.
> [ replaces /tmp by a safe ${WORKDIR} ]

Wow! That was quick.

However you seem to have missed the "cat << EOF" constructs, which I
believe were the subject of the original report:

> Jonathan Fortin <jfortin@REVELEX.COM> wrote:
>> When patchadd is executed, It creates a temporary file called
>> "/tmp/sh<pidofpatchadd>.1" , "/tmp/sh<pidofpatchadd>.2 ,
>> "/tmp/sh<pidofpatchadd>.3  and assigns them mode 666 ...

That is a bug in the ksh you are using: do not use "here documents" until
you fix the ksh. Need to check/fix all rootly ksh and sh scripts.

Paul Szabo - psz@maths.usyd.edu.au  http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics  University of Sydney   2006  Australia

home help back first fref pref prev next nref lref last post