Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 354143 - <app-text/tesseract-3.02: arbitrary file overwrite vulnerability
Summary: <app-text/tesseract-3.02: arbitrary file overwrite vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 454872
Blocks:
  Show dependency tree
 
Reported: 2011-02-08 19:27 UTC by Paweł Hajdan, Jr. (RETIRED)
Modified: 2013-04-10 00:27 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-08 19:27:38 UTC
A Debian bug report [1],[2] indicated that tesseract is vulnerable to an
arbitrary file overwrite flaw.  If a user could guess the PID of the tesseract
process and create a symlink in /tmp, they could cause the overwrite of any
file that the user running tesseract has write access to.  In
ccutil/debugwin.cpp we have:

253   length +=
254     sprintf (command + length,
255     ""stty opost; tty >/tmp/debug%d; while [ -s /tmp/debug%d ]\ndo\nsleep
1\ndone" &\n",
256     pid, pid);
257   length +=
258     sprintf (command + length, "trap "rm -f /tmp/debug%d; kill -9 $!" 0\n",
259     pid);
260   length += sprintf (command + length, "trap "exit" 1 2 3 13 15\n");
261   length +=
262     sprintf (command + length,
263     "while [ ! -s /tmp/debug%d ]\ndo\nsleep 1\ndone\n", pid);
264   length += sprintf (command + length, "trap "" 1 2 3 13 15\n");
265   length += sprintf (command + length, "ofile=`cat /tmp/debug%d`\n", pid);
266   length +=
267     sprintf (command + length, "cat -u - >$ofile; rm /tmp/debug%d\n", pid);

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612032
[2] https://bugs.launchpad.net/ubuntu/+source/tesseract/+bug/607297
Comment 1 Thomas Kahle (RETIRED) gentoo-dev 2013-01-31 17:13:05 UTC
This should be handled by stabilizing a 3.* version in bug 454872.
Comment 2 Tobias Heinlein (RETIRED) gentoo-dev 2013-03-24 19:31:37 UTC
Ready for vote, I vote NO.
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2013-04-10 00:27:57 UTC
GLSA vote: no, too.

Closing noglsa.