Helmut Grohne
2008-Apr-12 15:38 UTC
[Secure-testing-team] Bug#475733: acon: local root exploit
Package: acon Version: 1.0.5-5 Severity: critical Tags: security Justification: root security hole The package has a setuid binary acon. The binary never drops setuid. The source code contains the following lines: (acon.c) char tmp[300]; ... if((env=getenv("HOME"))) sprintf(tmp,"%s/.acon.conf",env); This can be easily exploited by a long $HOME. Helmut -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, ''unstable''), (500, ''testing''), (1, ''experimental'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.23.14 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/dash