[wml] [CVE-2008-0665] [CVE-2008-0666] insecure temporary files

Bug #191205 reported by disabled.user
256
Affects Status Importance Assigned to Milestone
wml (Debian)
Fix Released
Unknown
wml (Ubuntu)
Fix Released
Low
Emanuele Gentili
Dapper
Fix Released
Low
Emanuele Gentili
Edgy
Fix Released
Low
Emanuele Gentili
Feisty
Fix Released
Low
Emanuele Gentili
Gutsy
Fix Released
Low
Emanuele Gentili

Bug Description

Binary package hint: wml

References:
DSA-1492-1 (http://www.debian.org/security/2008/dsa-1492)

Quoting:
"Frank Lichtenheld and Nico Golde discovered that WML, an off-line HTML
generation toolkit, creates insecure temporary files in the eperl and
ipp backends and in the wmg.cgi script, which could lead to local denial
of service by overwriting files."

Changed in wml:
status: Unknown → Fix Released
Revision history for this message
Emanuele Gentili (emgent) wrote :

hardy fixed.

Changed in wml:
assignee: nobody → emgent
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Emanuele Gentili (emgent) wrote :

+wml (2.0.11-2ubuntu0.1) gutsy-security; urgency=low
+
+ * debian/control
+ - updated maintainer field
+ * SECURITY UPDATE: (LP: #191205)
+ + wml_backend/p1_ipp/ipp.src (CVE-2008-0665)
+ - in Website META Language (WML) 2.0.11 allows local
+ users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp
+ temporary file.
+ + wlm_backend/p3_eperl/eperl_sys.c wml_contrib/wmg.cgi (CVE-2008-0666)
+ - Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary
+ files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by
+ wml_contrib/wmg.cgi and (2) temporary files used by
+ wml_backend/p3_eperl/eperl_sys.c.
+ * References
+ + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0665
+ + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0666
+ + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907
+
+ -- Emanuele Gentili <email address hidden> Mon, 10 Mar 2008 16:58:14 +0100

Changed in wml:
assignee: nobody → emgent
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Emanuele Gentili (emgent) wrote :
Changed in wml:
assignee: nobody → emgent
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Emanuele Gentili (emgent) wrote :
Revision history for this message
Emanuele Gentili (emgent) wrote :

same edgy version, debdiff attached.

Changed in wml:
assignee: nobody → emgent
importance: Undecided → Low
status: New → In Progress
assignee: nobody → emgent
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Edgy/Dapper versions need to follow the SUP's versioning scheme -- they can't be the same version number in security updates.

[1] https://wiki.ubuntu.com/SecurityUpdateProcedures

Changed in wml:
status: In Progress → Incomplete
status: In Progress → Incomplete
status: In Progress → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

Feisty and Gutsy uploaded, thanks! They should publish shortly.

Changed in wml:
status: In Progress → Fix Committed
status: In Progress → Fix Committed
Revision history for this message
Emanuele Gentili (emgent) wrote :
Revision history for this message
Emanuele Gentili (emgent) wrote :
Changed in wml:
status: Incomplete → In Progress
status: Incomplete → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Sorry to keep picking on these debdiffs, but dapper and edgy can't have maintainer field updates -- the build tools don't expect it.

Changed in wml:
status: In Progress → Incomplete
status: In Progress → Incomplete
Revision history for this message
Emanuele Gentili (emgent) wrote :
Revision history for this message
Emanuele Gentili (emgent) wrote :
Changed in wml:
status: Incomplete → In Progress
status: Incomplete → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Great! Thanks, dapper/edgy have been uploaded.

Changed in wml:
status: In Progress → Fix Committed
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package wml - 2.0.11-2ubuntu0.1

---------------
wml (2.0.11-2ubuntu0.1) gutsy-security; urgency=low

  * debian/control
   - updated maintainer field
  * SECURITY UPDATE: (LP: #191205)
   + wml_backend/p1_ipp/ipp.src (CVE-2008-0665)
    - in Website META Language (WML) 2.0.11 allows local
      users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp
      temporary file.
   + wlm_backend/p3_eperl/eperl_sys.c wml_contrib/wmg.cgi (CVE-2008-0666)
    - Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary
      files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by
      wml_contrib/wmg.cgi and (2) temporary files used by
      wml_backend/p3_eperl/eperl_sys.c.
  * References
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0665
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0666
   + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907

 -- Emanuele Gentili <email address hidden> Mon, 10 Mar 2008 16:58:14 +0100

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package wml - 2.0.11-1ubuntu0.1

---------------
wml (2.0.11-1ubuntu0.1) feisty-security; urgency=low

  * debian/control
   - updated maintainer field
  * SECURITY UPDATE: (LP: #191205)
   + wml_backend/p1_ipp/ipp.src (CVE-2008-0665)
    - in Website META Language (WML) 2.0.11 allows local
      users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp
      temporary file.
   + wlm_backend/p3_eperl/eperl_sys.c wml_contrib/wmg.cgi (CVE-2008-0666)
    - Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary
      files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by
      wml_contrib/wmg.cgi and (2) temporary files used by
      wml_backend/p3_eperl/eperl_sys.c.
  * References
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0665
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0666
   + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907

 -- Emanuele Gentili <email address hidden> Mon, 10 Mar 2008 17:28:13 +0100

Changed in wml:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Changed in wml:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.