oss-sec mailing list archives
Re: CVE request: two vulnerabilities in ktsuss 1.4 and earlier
From: Josh Bressers <bressers () redhat com>
Date: Tue, 16 Aug 2011 16:34:33 -0400 (EDT)
----- Original Message -----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I reported these bugs privately to the Debian security team and the upstream author some time ago, but it does not appear that any CVE was created as a result. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626178 The 1.3 and 1.4 versions of ktsuss which include a setuid ktsuss binary suffered from two separate security bugs which can be used for local root exploits. The "1.314" version which does not include a setuid ktsuss binary and uses "su" for privilege escalation does not suffer from these problems. 1) When the target UID is the same as the real UID ktsuss skips authentication. Under these circumstances, ktsuss fails to change the effective UID back to the real UID. (line 118 of src/ktsuss.c in version 1.3.) $ ktsuss -u `whoami` whoami root
Use CVE-2011-2921 for the above issue.
2) The setuid ktsuss binary executes a GTK interface subprocess to prompt for username and password. This GTK interface runs as root and allows arbitrary code execution via the GTK_MODULES environmental variable.
Use CVE-2011-2922 for this issue. Thanks. -- JB
Current thread:
- CVE request: two vulnerabilities in ktsuss 1.4 and earlier John Lightsey (Aug 13)
- Re: CVE request: two vulnerabilities in ktsuss 1.4 and earlier Josh Bressers (Aug 16)