Debian Security Advisory DSA 460-2                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
April 3rd, 2004                          Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : sysstat
Vulnerability  : insecure temporary file
Problem-Type   : local
Debian-specific: no
CVE Ids        : CAN-2004-0108

Alan Cox discovered that the isag utility (which graphically displays
data collected by the sysstat tools), creates a temporary file without
taking proper precautions.  This vulnerability could allow a local
attacker to overwrite files with the privileges of the user invoking
isag.

The update used in DSA 460-1 did not fix every occurrence of the bug.
DSA 460-2 includes a more complete fix.

For the current stable distribution (woody) this problem has been
fixed in version 4.0.4-1woody2.

For the unstable distribution (sid) this problem has been fixed in
version 5.0.2-1.

We recommend that you update your sysstat package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      646 7f580bd95e4beb891308f768d23c8cf7
      
      Size/MD5 checksum:     9034 84514ad26e9ee46ef816a48cc0130aca
      
      Size/MD5 checksum:    99410 9bab6bb01949ba36ce0e5520699ebdf2

  Architecture independent components:

      
      Size/MD5 checksum:    15948 51625bb242d8813a5a36b6f46762037d

  Alpha architecture:

      
      Size/MD5 checksum:   101734 b01b8832667c4b2ccfe1491761ae3262

  ARM architecture:

      
      Size/MD5 checksum:    86348 d1e0b2ce8b9dd2be66127c6de76aad3e

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    78712 3b33e776572470aa69c0d38989277205

  Intel IA-64 architecture:

      
      Size/MD5 checksum:   115198 d9cc1e755a52348c8cced764616609a5

  HP Precision architecture:

      
      Size/MD5 checksum:    95478 1fe245a0dfa1660cc15ba98b8f37ee17

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:    74918 f451be4419f98e8d3a2a8698385a64c5

  Big endian MIPS architecture:

      
      Size/MD5 checksum:    87870 85fad1a5a2c7b80860a821ccb72506e3

  Little endian MIPS architecture:

      
      Size/MD5 checksum:    87652 d73a29ed3a0bf19d2998276646c73934

  PowerPC architecture:

      
      Size/MD5 checksum:    86980 b7e43a983e0bef5525249d76151de17c

  IBM S/390 architecture:

      
      Size/MD5 checksum:    83140 9741e6555f390f9248b53be845e72376

  Sun Sparc architecture:

      
      Size/MD5 checksum:    99346 ebfb5cfe81ac719d76bed6f71a232bec

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: sysstat Insecure temporary file vulnerability

April 5, 2004
As usual for temporary file vulnerabilities, this allows local users to read/overwrite arbitrary files with the permissions of the running user.

Summary

Alan Cox discovered that the isag utility (which graphically displays
data collected by the sysstat tools), creates a temporary file without
taking proper precautions. This vulnerability could allow a local
attacker to overwrite files with the privileges of the user invoking
isag.

The update used in DSA 460-1 did not fix every occurrence of the bug.
DSA 460-2 includes a more complete fix.

For the current stable distribution (woody) this problem has been
fixed in version 4.0.4-1woody2.

For the unstable distribution (sid) this problem has been fixed in
version 5.0.2-1.

We recommend that you update your sysstat package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding ...

Read the Full Advisory

Severity
Package : sysstat

Related News