Due to insecure handling of temporary files, some versions of sshd, an encrypted connection program, can delete any file named "cookies" accessible via the computer running sshd.
sshd is the server software used to support ssh, a popular encryted connection program. Some versions of OpenSSH fail to handle temporary files in a secure fashion, allowing their removal during an ssh session. This removal may be reflected in the removal of files named "cookies" on the server. Since sshd runs setuid root, ownership and protection of the "cookies" file will be disregarded.
Using this exploit, an attacker may cause loss of data, particularly web location data used in many web sites.
Apply vendor patches; see the Systems Affected section below.
This vulnerability was initially reported on the Bugtraq discussion list.
This document was last modified by Tim Shimeall.
|Date First Published:||2001-08-21|
|Date Last Updated:||2001-11-15 16:59 UTC|