SB2013120204 - Amazon Linux AMI update for augeas



SB2013120204 - Amazon Linux AMI update for augeas

Published: December 2, 2013

Security Bulletin ID SB2013120204
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Link following (CVE-ID: CVE-2012-0786)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.


2) Input validation error (CVE-ID: CVE-2012-0787)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.


Remediation

Install update from vendor's website.