OpenLDAP /usr/tmp/ 的符号连接漏洞

漏洞信息详情

OpenLDAP /usr/tmp/ 的符号连接漏洞

漏洞简介

Linux OpenLDAP 服务器存在漏洞,本地用户可以通过符号连接攻击修改任意文件。

漏洞公告

Patches are available from RedHat and TurboLinux to remedy this problem.
Rebuilding OpenLDAP, and configuring the following values to something other than /usr/tmp will fix this problem:
servers/slapd/back-ldbm/back-ldbm.g, “DEFAULT_DB_DIRECTORY” variable
servers/slapd/slapd.conf, “directory” variable
servers/slurpd/slurp.h, “DEFAULT_SLURPD_REPLICA_DIR” variable
The latest version, 1.2.10, still appears vulnerable to this problem.
RedHat openldap-1.2.7-2.i386.rpm

RedHat openldap-1.2.9-5.i386.rpm

Turbolinux Turbolinux 6.0.2

MandrakeSoft Linux Mandrake 6.1

RedHat Linux 6.1 i386

RedHat Linux 6.1 sparc

RedHat Linux 6.1 alpha

RedHat Linux 6.2 sparc

RedHat Linux 6.2 alpha

RedHat Linux 6.2 i386

MandrakeSoft Linux Mandrake 7.0

参考网址

来源: CALDERA
名称: CSSA-2000-009.0
链接:ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt

来源: TURBO
名称: TLSA2000010-1
链接:http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html

来源: BID
名称: 1232
链接:http://www.securityfocus.com/bid/1232

来源: REDHAT
名称: RHSA-2000:012
链接:http://www.redhat.com/support/errata/RHSA-2000-012.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享