Korean
<< Back
VID 21241
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Bugzilla bug-tracking system, according to its version number, has a vulnerability due to problem in handling for temporary files.
Bugzilla, developed by Mozilla project, is a open-source/free "bug-tracking" system for reporting bugs and assigning these bugs to the appropriate developers. It's available for Linux, Unix, and Microsoft Operating systems and web and E-mail based. Some versions of Bugzilla create temporary files in world or group-writable directories without checking see if the file name is already used or not. If an attacker with local access creates a symbolic link from the temporary file name to another critical file on the system, a local attacker can cause Bugzilla to overwrite critical files or create arbitary files on the system.

* Note: This check solely relied on the version number of the bugzilla system to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-04/0323.html
http://bugzilla.mozilla.org/show_bug.cgi?id=197153

* Platforms Affected:
Bugzilla 2.16.2 and earlier
Bugzilla 2.17.3 and earlier
Recommendation Upgrade to the fixed versions (2.16.3 or 2.17.4), available from Bugzilla web site: http://www.bugzilla.org/download.html
For users of version from 2.16 to 2.16.2, upgrade to version 2.16.3 using patches from: http://ftp.mozilla.org/pub/webtools/
Related URL CVE-2003-0603 (CVE)
Related URL 7412 (SecurityFocus)
Related URL 11867 (ISS)