Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200409-18 ] cdrtools: Local root vulnerability in cdrecord if set SUID root
Date: Tue, 14 Sep 2004 21:18:45
Message-Id: 200409142313.14776.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200409-18
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: cdrtools: Local root vulnerability in cdrecord if set SUID
9 root
10 Date: September 14, 2004
11 Bugs: #63187
12 ID: 200409-18
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 cdrecord, if manually set SUID root, is vulnerable to a local root
20 exploit allowing users to escalate privileges.
21
22 Background
23 ==========
24
25 The cdrtools package is a set of tools for CD recording, including the
26 popular cdrecord command-line utility.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-cdr/cdrtools <= 2.01_alpha37 >= 2.01_alpha37-r1
35 *>= 2.01_alpha28-r2
36
37 Description
38 ===========
39
40 Max Vozeler discovered that the cdrecord utility, when set to SUID
41 root, fails to drop root privileges before executing a user-supplied
42 RSH program. By default, Gentoo does not ship the cdrecord utility as
43 SUID root and therefore is not vulnerable. However, many users (and
44 CD-burning front-ends) set this manually after installation.
45
46 Impact
47 ======
48
49 A local attacker could specify a malicious program using the $RSH
50 environment variable and have it executed by the SUID cdrecord,
51 resulting in root privileges escalation.
52
53 Workaround
54 ==========
55
56 As a workaround, you could remove the SUID rights from your cdrecord
57 utility :
58
59 # chmod a-s /usr/bin/cdrecord
60
61 Resolution
62 ==========
63
64 All cdrtools users should upgrade to the latest version:
65
66 # emerge sync
67
68 # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1"
69 # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1"
70
71 References
72 ==========
73
74 [ 1 ] CAN-2004-0806
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200409-18.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2004 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/1.0