search menu icon-carat-right cmu-wordmark

CERT Coordination Center

/usr/libexec/vi.recover script contains vulnerability allowing arbitrary zero-length files to be removed

Vulnerability Note VU#191675

Original Release Date: 2002-09-16 | Last Revised: 2003-09-18

Overview

The /usr/libexec/vi.recover script in OpenBSD has a vulnerability that could allow an attacker to remove arbitrary zero-length files, including device nodes.

Description

The /usr/libexec/vi.recover script in OpenBSD cleans up vi temp files and informs a user via email if a recovery file exists for an aborted vi session. The vi.recover script is reported to contain an unspecified vulnerability that may allow the removal of arbitrary zero-length files, including device nodes.

The vi.recover script in OpenBSD is a perl adaptation of a shell script from the nvi package, which is also reported to be vulnerable and may be present in other UNIX-based operating systems.

This vulnerability is fixed in OpenBSD 3.1.

Impact

An attacker may be able to remove arbitrary zero-length files. This could allow a local attacker to cause a local denial of service by removing devices or files that enable services.

Solution

Obtain a patch for your system from one the following URLs.

For OpenBSD-2.9:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch

For OpenBSD-3.0:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/007_recover.patch


Another alternative is to remove /usr/libexec/vi.recover.

Vendor Information

191675
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Todd C. Miller for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: None
Severity Metric: 0.45
Date Public: 2001-01-15
Date First Published: 2002-09-16
Date Last Updated: 2003-09-18 20:02 UTC
Document Revision: 14

Sponsored by CISA.