First published: Tue Dec 04 2012(Updated: )
A security flaw was found in the way the Sleuth Kit (TSK), a collection of UNIX-based command line tools allowing to investigate a computer, performed management of '.' (dotfile) file system entry. An attacker could use this flaw to evade detection by forensic analysis (hide certain files not to be scanned) by renaming the file in question it to be '.' file system entry. The original reports speaks about this attack vector to be present when scanning FAT (File Allocation Table) file system. It is possible though, the flaw to be present on other file systems, which do not reserve usage of '.' entry for special purpose, too. References: [1] <a href="http://www.openwall.com/lists/oss-security/2012/12/01/2">http://www.openwall.com/lists/oss-security/2012/12/01/2</a> [2] <a href="http://sourceforge.net/mailarchive/forum.php?thread_name=1305739444.2355.35.camel%40zwerfkat&forum_name=sleuthkit-users">http://sourceforge.net/mailarchive/forum.php?thread_name=1305739444.2355.35.camel%40zwerfkat&forum_name=sleuthkit-users</a> [3] <a href="http://sourceforge.net/mailarchive/forum.php?thread_name=20120503111900.GL18142%40hauptmenue&forum_name=sleuthkit-users">http://sourceforge.net/mailarchive/forum.php?thread_name=20120503111900.GL18142%40hauptmenue&forum_name=sleuthkit-users</a> [4] <a href="http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/">http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/</a> [5] <a href="http://blog.crysys.hu/2012/06/flame-usb-dot-file-confirmed/">http://blog.crysys.hu/2012/06/flame-usb-dot-file-confirmed/</a> [6] <a href="http://www.openwall.com/lists/oss-security/2012/12/04/2">http://www.openwall.com/lists/oss-security/2012/12/04/2</a> Upstream bug report: [7] <a href="http://sourceforge.net/tracker/?func=detail&aid=3523019&group_id=55685&atid=477889">http://sourceforge.net/tracker/?func=detail&aid=3523019&group_id=55685&atid=477889</a> Upstream patch: OSS-security post [1] mentions no upstream patch to correct this issue to be available yet / so far.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
The Sleuth Kit | =4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5619 is considered a high-severity vulnerability due to its potential to allow attackers to hide files from forensic analysis.
To fix CVE-2012-5619, users should upgrade to a patched version of The Sleuth Kit that addresses this vulnerability.
CVE-2012-5619 affects The Sleuth Kit version 4.0.1 and potentially other versions if they share the same flaw.
Exploiting CVE-2012-5619 can enable attackers to evade detection during forensic investigations, potentially compromising data integrity.
Digital forensic investigators and organizations relying on The Sleuth Kit for investigations can be impacted by CVE-2012-5619.