diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2017-10-09 18:53:29 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2017-10-09 18:53:29 +0100 |
commit | 4f2d7949f03e1c198bc888f2d05f421d35c57e21 (patch) | |
tree | ba5f07bf3f9d22d82e54a462313f5d244036c768 /metadata/glsa/glsa-200409-18.xml |
reinit the tree, so we can have metadata
Diffstat (limited to 'metadata/glsa/glsa-200409-18.xml')
-rw-r--r-- | metadata/glsa/glsa-200409-18.xml | 73 |
1 files changed, 73 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200409-18.xml b/metadata/glsa/glsa-200409-18.xml new file mode 100644 index 000000000000..99683ad32d8e --- /dev/null +++ b/metadata/glsa/glsa-200409-18.xml @@ -0,0 +1,73 @@ +<?xml version="1.0" encoding="utf-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="200409-18"> + <title>cdrtools: Local root vulnerability in cdrecord if set SUID root</title> + <synopsis> + cdrecord, if manually set SUID root, is vulnerable to a local root exploit + allowing users to escalate privileges. + </synopsis> + <product type="ebuild">cdrtools</product> + <announced>2004-09-14</announced> + <revised>2004-09-14: 01</revised> + <bug>63187</bug> + <access>local</access> + <affected> + <package name="app-cdr/cdrtools" auto="yes" arch="*"> + <unaffected range="ge">2.01_alpha37-r1</unaffected> + <unaffected range="rge">2.01_alpha28-r2</unaffected> + <vulnerable range="le">2.01_alpha37</vulnerable> + </package> + </affected> + <background> + <p> + The cdrtools package is a set of tools for CD recording, including the + popular cdrecord command-line utility. + </p> + </background> + <description> + <p> + Max Vozeler discovered that the cdrecord utility, when set to SUID root, + fails to drop root privileges before executing a user-supplied RSH program. + By default, Gentoo does not ship the cdrecord utility as SUID root and + therefore is not vulnerable. However, many users (and CD-burning + front-ends) set this manually after installation. + </p> + </description> + <impact type="high"> + <p> + A local attacker could specify a malicious program using the $RSH + environment variable and have it executed by the SUID cdrecord, resulting + in root privileges escalation. + </p> + </impact> + <workaround> + <p> + As a workaround, you could remove the SUID rights from your cdrecord + utility : + </p> + <code> + # chmod a-s /usr/bin/cdrecord</code> + </workaround> + <resolution> + <p> + All cdrtools users should upgrade to the latest version: + </p> + <code> + # emerge sync + + # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1" + # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1"</code> + </resolution> + <references> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806">CAN-2004-0806</uri> + </references> + <metadata tag="requester" timestamp="2004-09-14T07:01:02Z"> + jaervosz + </metadata> + <metadata tag="submitter" timestamp="2004-09-14T15:13:17Z"> + koon + </metadata> + <metadata tag="bugReady" timestamp="2004-09-14T20:25:30Z"> + jaervosz + </metadata> +</glsa> |