Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 Feb 2011 16:01:58 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE Request: PEAR Installer 1.9.1 <= - Symlink
 Attack

Please use CVE-2011-1072

Thanks.

-- 
    JB


----- Original Message -----
> The lack of symlink checks in the PEAR installer 1.9.1 <= while doing
> installation and upgrades, which initiate various system write
> operations, can cause privileged users unknowingly to overwrite
> critical system files.
> 
> Further information can be found in this temporary advisory
> http://pear.php.net/advisory-20110228.txt and the
> 
> Fixes can be found at http://news.php.net/php.pear.cvs/61264
> 
> - Helgi

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ