sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sos | Sos_project | 3.0 (including) | 3.8 (including) |
Sosreport | Ubuntu | trusty | * |
Sosreport | Ubuntu | upstream | * |
Sosreport | Ubuntu | vivid | * |
Sosreport | Ubuntu | wily | * |
Red Hat Enterprise Linux 6 | RedHat | sos-0:3.2-28.el6_7.2 | * |
Red Hat Enterprise Linux 7 | RedHat | sos-0:3.2-35.el7_2.3 | * |