vendor:
startmidi
by:
SecurityFocus
7.2
CVSS
HIGH
Symbolic Link Attack
264
CWE
Product Name: startmidi
Affected Version From: Irix 5.x
Affected Version To: Irix 6.x
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Irix
2002
Silicon Graphics startmidi Vulnerability
A vulnerability exists in the startmidi program from Silicon Graphics. This utility is included with Irix versions 5.x and 6.x with the Iris Digital Media Execution Environment. startmidi is setuid root, and creates a temporary file called /tmp/.midipid. It does not check to see if this file already exists, and is a symbolic link. As such, it can be used to create root owned files, with permissions as set by the user umask.
Mitigation:
Ensure that the startmidi program is not setuid root and that the /tmp/.midipid file is not a symbolic link.