SB2011063002 - Multiple vulnerabilities in GNU groff
Published: June 30, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2009-5079)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file.
2) Link following (CVE-ID: CVE-2009-5080)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
3) Link following (CVE-ID: CVE-2009-5081)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
Remediation
Install update from vendor's website.
References
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff
- http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1;r2=1.2;f=h
- http://openwall.com/lists/oss-security/2009/08/14/4
- http://openwall.com/lists/oss-security/2009/08/14/5
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:085
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:086