[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
- read forum
- new topic
- search

- meetings list
- recent additions
- add your info
 top 100 sites
- visit top sites
- sign up now
- members

- add your url
- add domain
- search box
- link to us

- our projects
- free email
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Vulnerability in the go-gnome pre-installer

Title: Vulnerability in the go-gnome pre-installer
Released by: Helix code
Date: 29th August 2000
Printable version: Click here
HELIX CODE, INC.                                             SECURITY ADVISORY

security@helixcode.com                                 Issue Date: 29 Aug 2000


"go-gnome" Helix GNOME pre-installer


A vulnerability in the go-gnome pre-installer allows non-root users to exploit

world-writable permissions in /tmp, permitting files normally only accessible

by root to be overwritten.


The go-gnome pre-installer uses a few rather predictable filenames in /tmp

for uudecode, snarf, and the installer files. If one (or more) of those files

already exist with a symbolic link created by a malicious user, the files

pointed to by those links will be clobbered.


The go-gnome pre-installer has been updated on the main Helix Code mirror and

go-gnome.com. This new version fixes this vulnerability by storing files in

/var/cache/helix-install, which is writable only by root.


A new version of the go-gnome pre-installer is available immediately from Helix

Code, Inc. at go-gnome.com:



94e5849dd659642bc58d768d12c3c26d  go-gnome

Copyright (c) 2000 Helix Code, Inc.

(C) 1999-2000 All rights reserved.