Lucene search

K
gentooGentoo FoundationGLSA-200903-35
HistoryMar 23, 2009 - 12:00 a.m.

Muttprint: Insecure temporary file usage

2009-03-2300:00:00
Gentoo Foundation
security.gentoo.org
10

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Background

Muttprint formats the output of mail clients to a good-looking printing using LaTeX.

Description

Dmitry E. Oboukhov reported an insecure usage of the temporary file “/tmp/muttprint.log” in the muttprint script.

Impact

A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All Muttprint users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-misc/muttprint-0.72d-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-misc/muttprint< 0.72d-r1UNKNOWN

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%