[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PISA-21-APR-00-004



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

              .------------------------------------------------.
              |**** Project Independence Security Advisory ****|
              `-----------* ID: PISA-21-APR-00-004 *-----------'
                    Issued by: David Webster <cog@seul.org>

Issue Date: 21-APR-00

Overview: Openldap sym link security hole fix 

Affected: Indy6.2build prior to above date.

References: RHSA-2000:012-05
            
                                  -=-=-==-=-=-

Detailed Problem Description:

	OpenLDAP follows symbolic links when creating files.  The 
	default location for these files is /usr/tmp, which is a 
	symlink to /tmp, which in turn is a world-writable directory.
	Local users can destroy the contents of any file on any 
	mounted filesystem.

Solution:

        Update the affected RPM packages by downloading and
        installing the RPMs listed below. For each RPM, run:

                root# rpm -Fvh <filename>

        where <filename> is the name of the RPM.

        [Note: You need only install EITHER the compiled RPM,
        (*.i386.rpm) OR the source RPM, (*.src.rpm), NOT both.]

	Administrators with existing databases should also move their 
	NEXT`ID and *.dbb files from /usr/tmp to /var/lib/ldap, and 
	verify that the 'directory' setting in /etc/openldap/slapd.conf 
	is changed accordingly.

RPMs:

	http://independence.seul.org/security/2000/rpms/openldap-1.2.9-6.i386.rpm
	ftp://updates.redhat.com/6.2/i386/openldap-1.2.9-6.i386.rpm

Source RPMs:

	http://independence.seul.org/security/2000/rpms/openldap-1.2.9-6.src.rpm
	ftp://updates.redhat.com/6.2/SRPMS/openldap-1.2.9-6.src.rpm

Verification:

MD5 sum                           Package Name
- --------------------------------------------------------------------------
17fbdb33172a7884f56b4fc746b1b763  openldap-1.2.9-6.src.rpm
058c4aa63710da7490f98da4b3cad53d  openldap-1.2.9-6.i386.rpm
- --------------------------------------------------------------------------

These packages are GPG signed by Red Hat, Inc. for security.
Their key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

This security advisory, and all future ones should be signed by me,
David Webster (aka cognition), with key ID: 45 FA C2 83

An archive of these messages can be currently be found on:
http://independence.seul.org/security/

A process of automatic retrieval is being worked on.

	     [Thanks go to Stan Bubrouski for discovering 
	     the problem, and to RedHat for fixing them.]

        .---------------------------------------------------.
        | And problems regarding this, or future advisories |
        |      should be emailed to me: <cog@seul.org>      |
        `---------------------------------------------------'
-----BEGIN PGP SIGNATURE-----
Comment: David Webster (aka cogNiTioN) <http://www.cognite.net/>

iD8DBQE5AOEHDdLNO0X6woMRAlP9AKCEK0R0hOR4EXNjJZyPZ0OnMT6TyACfW3zv
GBjtAR+YudH7y8sSpSOWsWk=
=lKGZ
-----END PGP SIGNATURE-----