[Security-team] [Fwd: [SA20950] shadow setuid Vulnerability]
Alexey Borovskoy
=?iso-8859-1?q?alexey=2Eborovskoy_=CE=C1_gmail=2Ecom?=
Сб Июл 8 11:01:44 MSD 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
TITLE:
shadow setuid Vulnerability
SECUNIA ADVISORY ID:
SA20950
VERIFY ADVISORY:
http://secunia.com/advisories/20950/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
Shadow 4.x
http://secunia.com/product/4190/
DESCRIPTION:
Ilja van Sprundel reported a vulnerability in the passwd application
of shadow, which potentially can be exploited by malicious, local
users to perform certain actions with escalated privileges.
The vulnerability is due to missing checks in passwd for whether the
"setuid()" call has succeeded, when started with the -f, -g, or -s
option. This can potentially be exploited to launch chfn, chsh, or
gpasswd with root privileges, which may allow the user to perform
certain actions as the root user.
Successful exploitation allows to perform certain actions with
escalated privileges, but requires that PAM is configured with a
maximum number of user processes.
This vulnerability was reported in version 4.0.3 and 4.0.13. Prior
versions may be also affected.
SOLUTION:
Update to version 4.0.14 or later.
ftp://ftp.pld.org.pl/software/shadow/
PROVIDED AND/OR DISCOVERED BY:
Ilja van Sprundel
ORIGINAL ADVISORY:
http://www.ubuntu.com/usn/usn-308-1
- --
Алексей.
GPG key fingerprint
949B BC0E 2C44 7528 4F63 2753 E37A 9E3F 11F3 BDE1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEr1hX43qePxHzveERAmy/AJ9s7ibLqRgKKWFX7Isr8D0t33FBgQCbBJNl
R09Db8+w7my6paJeK2fgmDM=
=WhDR
-----END PGP SIGNATURE-----
Подробная информация о списке рассылки Security-team