From researchteam5@esecurityonline.com Fri May 3 03:39:57 2002 From: researchteam5@esecurityonline.com To: vulnwatch@vulnwatch.org, bugtraq@securityfocus.com Cc: ken.williams@ey.com Date: Mon, 29 Apr 2002 16:03:13 -0500 Subject: [VulnWatch] eSecurityOnline Security Advisory 4125 - Lotus Domino bindsock ar bitrary file creation vulnerability eSO Security Advisory: 4125 Discovery Date: October 15, 2001 ID: eSO:4125 Title: Lotus Domino bindsock arbitrary file creation vulnerability Impact: Local attackers can create root-owned world writable files, which can lead to gaining additional privileges Affected Technology: Lotus Domino 5.0.7 on Sun Solaris Vendor Status: Patches are available Discovered By: Kevin Kotas of the eSecurityOnline Research and Development Team Technical Contributor: Richard Johnson of the eSecurityOnline Research and Development Team CVE Reference: CAN-2002-0087 Advisory Location: http://www.eSecurityOnline.com/advisories/eSO4125.asp Description: Lotus Domino for Solaris is vulnerable to a flaw that allows a local attacker to create arbitrary files. The problem is due to predictable temporary file naming. An attacker can use a symbolic link attack and create writable root-owned files anywhere on a system. Technical Recommendation: Upgrade with the latest version available. Lotus Domino version 5.0.9a is not vulnerable to the issue. Vendor Reference: Technote #191636 Acknowledgements: eSecurityOnline would like to thank Lotus Security for their cooperation in resolving the issue. Copyright 2002 eSecurityOnline LLC. All rights reserved. THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND, AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE, CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN THIS VULNERABILITY ALERT.