MandrakeSoft Affected

Notified:  July 09, 2001 Updated: September 27, 2001

Status

Affected

Vendor Statement

http://www.linuxsecurity.com/advisories/mandrake_advisory-1502.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

sourceforge Affected

Notified:  January 16, 2001 Updated: September 27, 2001

Status

Affected

Vendor Statement

corrected version available at http://sourceforge.net/projects/tripwire/.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Tripwire Affected

Notified:  October 09, 2001 Updated: October 29, 2001

Status

Affected

Vendor Statement

The vulnerability exists in Tripwire versions prior to 2.4.0 and commercial customers should be encouraged to upgrade to the most current shipping product, version 2.4.2. Open Source and ASR users should upgrade to Open Source version 2.3.1-2 or later (see http://www.sourceforge.net/projects/tripwire for the latest information) or apply the documented code fixes to their particular release and recompile. In version Commercial 2.4.x and Open Source 2.3.1-2, the O_EXCL flag is used when opening temporary files, to insure the temporary file does not already exist, thus making the exploit much more difficult. In version, 2.4.0 and greater, we have implemented a variable that allows a user to specify a Tripwire specific temp directory whose permissions can be set to only be writeable by tripwire (typically run as root). The traditional /tmp directory is writeable by world which enables the various exploits. Setting TEMPDIRECTORY to a directory whose permissions are closely controlled removes any possibility of a non-root user using temp directory exploits to modify tripwire behavior. Tripwire, Inc. has been actively developing a commercial version of Tripwire for Servers which is fully verified and maintained for a wide variety of hardware and software platforms. We recommend the use of Tripwire's commercial software in any environment where secure, supported, commercial quality software is required. For more information about Tripwire's commercial data and network integrity solutions, go to www.tripwire.com.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.