Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

eTrust InoculateIT for Linux Insecure Default Installation

Feb 9, 2004 9:39PM PST

Secunia Advisory: SA10833
Release Date: 2004-02-10

Critical: Less critical
Impact: Manipulation of data
Exposure of system information
Exposure of sensitive information
Privilege escalation
Where: Local system

Software: eTrust InoculateIT 6.x for Linux

Description:
l0om has reported some vulnerabilities in eTrust InoculateIT for Linux, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with other users' privileges.

The scripts "inoregupdate", "uniftest", and "unimove" reportedly create temporary files insecurely. This can be exploited via symlink attacks to overwrite, create, and delete arbitrary files with the privileges of the user running a vulnerable script.

Some directories are reportedly also installed with insecure default permissions.

The vulnerabilities have been reported in version 6.0.

Solution:
Grant only trusted users access to an affected system.

http://www.secunia.com/advisories/10833/

Discussion is locked