| VID |
21241 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Bugzilla bug-tracking system, according to its version number, has a vulnerability due to problem in handling for temporary files. Bugzilla, developed by Mozilla project, is a open-source/free "bug-tracking" system for reporting bugs and assigning these bugs to the appropriate developers. It's available for Linux, Unix, and Microsoft Operating systems and web and E-mail based. Some versions of Bugzilla create temporary files in world or group-writable directories without checking see if the file name is already used or not. If an attacker with local access creates a symbolic link from the temporary file name to another critical file on the system, a local attacker can cause Bugzilla to overwrite critical files or create arbitary files on the system.
* Note: This check solely relied on the version number of the bugzilla system to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2003-04/0323.html http://bugzilla.mozilla.org/show_bug.cgi?id=197153
* Platforms Affected: Bugzilla 2.16.2 and earlier Bugzilla 2.17.3 and earlier |
| Recommendation |
Upgrade to the fixed versions (2.16.3 or 2.17.4), available from Bugzilla web site: http://www.bugzilla.org/download.html For users of version from 2.16 to 2.16.2, upgrade to version 2.16.3 using patches from: http://ftp.mozilla.org/pub/webtools/ |
| Related URL |
CVE-2003-0603 (CVE) |
| Related URL |
7412 (SecurityFocus) |
| Related URL |
11867 (ISS) |
|