COMMAND
pico
SYSTEMS AFFECTED
pico 3.7
PROBLEM
Following is based on a Wkit Security Avisory WSIR-00/11-02 by
Christer Oberg and Patrik Birgersson. Upon abnormal exit, the
text editor saves any changes made to the file being edited into a
new file in the current working directory labeled filename.save
(where filename will correspond to the name of the file being
edited, e.g. test.txt will be saved as test.txt.save). When
saving this file, the text editor does not check for the file
type. A user editing a file in a directory writable by others
could be subject to having other files written to if a malicious
user were to symbollically link the filename.save file to one of
owner/group write access of the user. This would result in the
contents of the pico session being written to the symbolically
linked file.
Conditions:
1. The malicious user must have write permissions in the directory
where the file is being edited, in order to create a link.
2. The 'victim user' must have write permissions for the 'victim
file'.
3. The 'victim user' pico session must terminate abnormally.
4. The file being edited must not have been saved
Vulnerability example:
* Root is logged in remote
* Malicious user (foo) notices that root is editing file.txt
in /tmp (where foo has write permissions)
* foo creates a link from /etc/passwd (root = write permission)
to /tmp/filename.save
* Root's connection is dropped or terminated under abnormal
conditions (for example: root halts the system) before
file.txt is saved, the editor will write a rescue copy to
/tmp/ filename.save
* The editor won't check if /tmp/ filename.save is a link, and
overwrites /etc/passwd with the content of file.txt.
SOLUTION
No information available.