The file gentestcrt.sh distributed with net-www/mod_ssl makes insecure usage of files in /tmp. The directory /tmp/tmpssl-$$ is created. A local attacker could run a script to wait for the gentestcrt.sh process to start, and get the process ID of the script. Then, the attacker could create that directory before the script had a chance, and create symlinks in the directory. Since the files used by gentestcrt.sh could already exist as symlinks, the overwriting of arbitrary files on the filesystem would be possible. Please create these temporary files using either `tempfile` or `mktemp`.
apache-bugs please advise.
any news here? anyone got a patch?
Apache, any news on this one?
(In reply to comment #3) > Apache, any news on this one? apache-1 and all dependent modules (like mod_ssl) will get masked once the Apache article is published in next (hopefully) week's GWN.
Apache1 and all its modules, mod_ssl included, were masked today. Closing this. Best regards, CHTEKK.