Vulnerability Note VU#570952
Redhat Linux diskcheck.pl creates predictable temporary file and fails to check for existing symbolic link of same name
Diskcheck.pl is a PERL script, part of Red Hat's powertools suite, that alerts a system administrator if any file system approaches capacity. In creating email alerts, diskcheck.pl creates insecure temporary files in a world-writable directory, which may permit an attacker to corrupt any writable file on the system.
Diskcheck.pl is designed to run hourly. When any file system approaches capacity, it generates an email message to the system administrator, using a temporary file with a predictable name in the /tmp directory, without checking for the prior existence or ownership of this file. By its nature, Disckcheck runs with setuid root.
By creating a symbolic link with appropriate name and pointed to any writable file on the system, a local attacker can corrupt that file when diskcheck detects a file system approaching capacity.
Apply vendor patches; see the Systems Affected section below.
Modify diskcheck.pl to remove any file from /tmp named for its temporary file.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|RedHat||Affected||05 Dec 2000||04 Oct 2001|
CVSS Metrics (Learn More)
This vulnerability was first announced by Stan Bubrouski .
This document was last modified by Tim Shimeall.
- CVE IDs: CAN-2000-0715
- Date Public: 20 Dec 2000
- Date First Published: 08 Oct 2001
- Date Last Updated: 08 Oct 2001
- Severity Metric: 4.32
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.