DSA-108-1 wmtv -- symlink vulnerability

Related Vulnerabilities: CVE-2002-0247   CVE-2002-0248  

Nicolas Boullis found some security problems in the wmtv package (a dockable video4linux TV player for windowmaker) which is distributed in Debian GNU/Linux 2.2. With the current version of wmtv, the configuration file is written back as the superuser, and without any further checks. A malicious user might use that to damage important files. This problem has been fixed in version 0.6.5-2potato2 for the stable distribution by dropping privileges as soon as possible and only regaining them where required. In the current testing/unstable distribution this problem has been fixed in version 0.6.5-9 and above by not requiring privileges anymore. Both contain fixes for two potential buffer overflows as well. We recommend that you upgrade your wmtv packages immediately.

Debian Security Advisory

DSA-108-1 wmtv -- symlink vulnerability

Date Reported:
07 Feb 2002
Affected Packages:
wmtv
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2002-0247, CVE-2002-0248.
More information:

Nicolas Boullis found some security problems in the wmtv package (a dockable video4linux TV player for windowmaker) which is distributed in Debian GNU/Linux 2.2. With the current version of wmtv, the configuration file is written back as the superuser, and without any further checks. A malicious user might use that to damage important files.

This problem has been fixed in version 0.6.5-2potato2 for the stable distribution by dropping privileges as soon as possible and only regaining them where required. In the current testing/unstable distribution this problem has been fixed in version 0.6.5-9 and above by not requiring privileges anymore. Both contain fixes for two potential buffer overflows as well.

We recommend that you upgrade your wmtv packages immediately.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/wmtv_0.6.5-2potato2.diff.gz
http://security.debian.org/dists/stable/updates/main/source/wmtv_0.6.5-2potato2.dsc
http://security.debian.org/dists/stable/updates/main/source/wmtv_0.6.5.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/wmtv_0.6.5-2potato2_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/wmtv_0.6.5-2potato2_arm.deb
Intel ia32:
http://security.debian.org/dists/stable/updates/main/binary-i386/wmtv_0.6.5-2potato2_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/wmtv_0.6.5-2potato2_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/wmtv_0.6.5-2potato2_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/wmtv_0.6.5-2potato2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.