Vulnerability Name:

CVE-2008-4192 (CCN-44845)

Assigned:2008-08-24
Published:2008-08-24
Updated:2017-08-08
Summary:The pserver_shutdown function in fence_egenera in cman 2.20080629 and 2.20080801 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/eglog temporary file.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.7 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
3.3 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P)
2.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
1.2 Low (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N)
1.0 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-59
CWE-377
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: Debian Bug report logs - #496410
The possibility of attack with the help of symlinks in some Debian packages

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496410

Source: MITRE
Type: CNA
CVE-2008-4192

Source: CONFIRM
Type: UNKNOWN
http://dev.gentoo.org/~rbu/security/debiantemp/cman

Source: CCN
Type: cman Web page
Package: cman (1.03.00-2)

Source: CCN
Type: RHSA-2011-0266
Low: fence security, bug fix, and enhancement update

Source: CCN
Type: SA31887
Cluster Project CMAN "fence_egenera" Insecure Temporary Files

Source: SECUNIA
Type: Vendor Advisory
31887

Source: SECUNIA
Type: Vendor Advisory
32387

Source: SECUNIA
Type: Vendor Advisory
32390

Source: SECUNIA
Type: Vendor Advisory
43362

Source: CCN
Type: Dmitry E. Oboukhov Advisory
Package: cman

Source: MISC
Type: UNKNOWN
http://uvw.ru/report.lenny.txt

Source: MLIST
Type: UNKNOWN
[oss-security] 20080918 CVE Request (openswan, emacspeak, cman)

Source: MLIST
Type: UNKNOWN
[oss-security] 20080923 Re: CVE Request (openswan, emacspeak, cman)

Source: MLIST
Type: UNKNOWN
[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire

Source: CCN
Type: OSVDB ID: 48268
cman fence_egenera pserver_shutdown Function Temporary File Symlink Arbitrary File Overwrite

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0266

Source: BID
Type: UNKNOWN
30898

Source: CCN
Type: BID-30898
cman 'fence_egenera' Insecure Temporary File Creation Vulnerability

Source: CCN
Type: USN-875-1
Red Hat Cluster Suite vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-875-1

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0419

Source: CONFIRM
Type: UNKNOWN
https://bugs.gentoo.org/show_bug.cgi?id=235770

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=460476

Source: XF
Type: UNKNOWN
cman-fenceegenera-symlink(44845)

Source: XF
Type: UNKNOWN
cman-fenceegenera-symlink(44845)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-9042

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:cman:2.20080629:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:cman:2.20080801:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:12938
    P
    USN-875-1 -- redhat-cluster, redhat-cluster-suite vulnerabilities
    2014-06-30
    oval:com.redhat.rhba:def:20100266
    P
    RHBA-2010:0266: cman bug fix and enhancement update (Low)
    2010-03-30
    BACK
    redhat cman 2.20080629
    redhat cman 2.20080801