search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Uudecode performs inadequate checks on user-specified output files

Vulnerability Note VU#336083

Original Release Date: 2002-07-15 | Last Revised: 2002-12-13

Overview

The uudecode utility contains a vulnerability that allows an attacker to overwrite arbitrary files, symbolic links, and named pipes.

Description

The uudecode utility is used to decode files that have been encoded in the 7-bit printable format generated by uuencode. This format allows for the specification of a desired output file name, which may also contain an absolute or relative path. Some implementations of uudecode fail to check the specified file name or its type before writing, so it is possible for uudecode to overwrite existing files, including regular files, symbolic links, and named pipes.

If an attacker can convince a user to invoke uudecode on a malicious file without reviewing the included file name, the attacker can cause the user to overwrite any file accessible by the user. If the victim user has root privileges, the attacker can exploit this vulnerability to overwrite arbitrary files. With respect to symbolic links and named pipes, attackers who exploit this vulnerability can alter the normal operation of system scripts and running processes, significantly increasing the risk of system compromise.

This vulnerability was first discovered in the uudecode implementation included with the GNU Sharutils package, but may be present in other implementations as well. For more information on GNU Sharutils, please see http://www.gnu.org/directory/sharutils.html.

Impact

Attackers can convince users to overwrite arbitrary files, symbolic links, and named pipes. This ability can be leveraged to gather information, destroy system and user data, and gain control of vulnerable hosts.

Solution

Apply a patch from your vendor

Please see the vendor section of this document for information on obtaining patches.

Vendor Information

336083
 

View all 28 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by AERAsec.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: CVE-2002-0178
Severity Metric: 9.41
Date Public: 2002-04-16
Date First Published: 2002-07-15
Date Last Updated: 2002-12-13 16:42 UTC
Document Revision: 29

Sponsored by CISA.