search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Various shells create temporary files insecurely when using << operator

Vulnerability Note VU#10277

Original Release Date: 2001-07-02 | Last Revised: 2007-04-24

Overview

sh uses /tmp files of a predictable name in creating files for input redirection using the << operator.

Description

When performing the "<<" redirection, /bin/sh creates a temporary file in /tmp with a name based on the process id, writes subsequent input out to that file, and then closes the file before re-opening it as the standard input of the command to be executed. At no stage are the results of the creat(), write(), or open() calls checked for an error status.

Impact

It is possible for another user to alter what is read from this file.

    • If the sticky bit is not set on /tmp, the file can be simply removed, and a new file created in its place
    • If the sticky bit is set, then it is possible to guess what the file will be called and create it before /bin/sh does (the creat() call performed by the shell does not result in an open() call with O_EXCL set) and hence it is possible to maintain a handle on the underlying file.
    • If a fifo is created in place of the temporary file it is particularly easy to insert an extra command into the input transparently, and without having to worry about ensuring the bug is exploited during the narrow window of time in which it occurs.
Even without reading, creating this file may block the execution of commands using the << operator.
It may also be possible to create a symbolic link named as the temporary file and pointed to any other file on the system writable by the user of the shell, which may lead to corruption of the file to which the link is pointed.

Solution

Apply vendor patches; see the Systems Affected section below.

Avoid the use of << operator in cron jobs and similar administration scripts.

Vendor Information

10277
 

View all 24 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The original discoverer of this vul was Gordon Irlam of the Univeristy of Adelaide, Australia.

This document was written by James T. Ellis, modified by Tim Shimeall to reflect 2001 reporting

Other Information

CVE IDs: CVE-2000-1134
Severity Metric: 1.73
Date Public: 1991-07-17
Date First Published: 2001-07-02
Date Last Updated: 2007-04-24 18:02 UTC
Document Revision: 19

Sponsored by CISA.