Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Using the POSIX function open() to create a file but failing to provide access permissions for that file may cause that file to be created with unintended access permissions. This omission has been known to lead to vulnerabilities; for instance, CVE-2006-1174.

Code Block
bgColor#FFCCCC

...
int fd = open(file_name, O_CREAT | O_WRONLY); /* access permissions are missing */
if (fd == -1){
  /* Handle Error */
}
...

...

Access permissions for the newly created file should be specified in the call to open().

Code Block
bgColor#ccccff
...
int fd = open(file_name, O_CREAT | O_WRONLY, file_access_permissions);
if (fd == -1){
  /* Handle Error */
}
...

...

The fopen() function does not provide a mechanism to specify file access permissions. In the example below, if the call to fopen() creates a new file, the access permissions for that file will be implementation defined.

Code Block
bgColor#FFCCCC
 
...
FILE * fptr = fopen(file_name, "w");
if (!fptr){
  /* Handle Error */
}
...

...

The fopen_s() function defined in ISO/IEC TR 24731-2006 provides some control over file access permissions. Specifically, the report states: "If the file is being created, and the first character of the mode string is not 'u', to the extent that the underlying system supports it, the file shall have a file permission that prevents other users on the system from accessing the file."

Code Block
bgColor#ccccff
...
File *fptr;
errno_t res = fopen_s(&fptr,file_name, "w");
if (res != 0) {
  /* Handle Error */
}
...

Risk Assessment

Creating files without appropriate access permissions may allow unintended access to those files.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

 

 

 

 

 

FIO06-A

3 (high)

1 (unlikely)

2 (medium)

P6

L2  

References