CVE Vulnerabilities

CVE-2013-2561

Improper Link Resolution Before File Access ('Link Following')

Published: Nov 23, 2013 | Modified: Apr 22, 2019
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.3 MEDIUM
AV:L/AC:M/Au:N/C:N/I:C/A:C
RedHat/V2
4 MODERATE
AV:L/AC:H/Au:N/C:N/I:C/A:N
RedHat/V3
Ubuntu
LOW

OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on (1) ibdiagnet.db, (2) ibdiagnet.fdbs, (3) ibdiagnet_ibis.log, (4) ibdiagnet.log, (5) ibdiagnet.lst, (6) ibdiagnet.mcfdbs, (7) ibdiagnet.pkey, (8) ibdiagnet.psl, (9) ibdiagnet.slvl, or (10) ibdiagnet.sm in /tmp/.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Enterprise_linux Redhat 6.0 (including) 6.0 (including)
Red Hat Enterprise Linux 6 RedHat ibutils-0:1.5.7-8.el6 *
Red Hat Enterprise Linux 6 RedHat infinipath-psm-0:3.0.1-115.1015_open.2.el6 *
Red Hat Enterprise Linux 6 RedHat libibverbs-0:1.1.7-1.el6 *
Red Hat Enterprise Linux 6 RedHat libmlx4-0:1.0.5-4.el6.1 *
Red Hat Enterprise Linux 6 RedHat librdmacm-0:1.0.17-1.el6 *
Red Hat Enterprise Linux 6 RedHat mpitests-0:3.2-9.el6 *
Red Hat Enterprise Linux 6 RedHat mstflint-0:3.0-0.6.g6961daa.1.el6 *
Red Hat Enterprise Linux 6 RedHat openmpi-0:1.5.4-2.el6 *
Red Hat Enterprise Linux 6 RedHat perftest-0:2.0-2.el6 *
Red Hat Enterprise Linux 6 RedHat qperf-0:0.4.9-1.el6 *
Red Hat Enterprise Linux 6 RedHat rdma-0:3.10-3.el6 *
Ibutils Ubuntu artful *
Ibutils Ubuntu cosmic *
Ibutils Ubuntu devel *
Ibutils Ubuntu disco *
Ibutils Ubuntu eoan *
Ibutils Ubuntu esm-apps/focal *
Ibutils Ubuntu esm-apps/jammy *
Ibutils Ubuntu esm-apps/noble *
Ibutils Ubuntu focal *
Ibutils Ubuntu groovy *
Ibutils Ubuntu hirsute *
Ibutils Ubuntu impish *
Ibutils Ubuntu jammy *
Ibutils Ubuntu kinetic *
Ibutils Ubuntu lunar *
Ibutils Ubuntu mantic *
Ibutils Ubuntu noble *
Ibutils Ubuntu oneiric *
Ibutils Ubuntu oracular *
Ibutils Ubuntu precise *
Ibutils Ubuntu quantal *
Ibutils Ubuntu raring *
Ibutils Ubuntu saucy *
Ibutils Ubuntu trusty *
Ibutils Ubuntu upstream *
Ibutils Ubuntu utopic *
Ibutils Ubuntu vivid *
Ibutils Ubuntu wily *
Ibutils Ubuntu yakkety *
Ibutils Ubuntu zesty *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References