Helmut Grohne
2008-Apr-12 15:38 UTC
[Secure-testing-team] Bug#475733: acon: local root exploit
Package: acon
Version: 1.0.5-5
Severity: critical
Tags: security
Justification: root security hole
The package has a setuid binary acon. The binary never drops setuid. The
source code contains the following lines: (acon.c)
char tmp[300];
...
if((env=getenv("HOME")))
sprintf(tmp,"%s/.acon.conf",env);
This can be easily exploited by a long $HOME.
Helmut
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, ''unstable''), (500,
''testing''), (1, ''experimental'')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.23.14 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash