Helmut Grohne
2008-Apr-12 15:52 UTC
[Secure-testing-team] Bug#475736: tss: local root exploit
Package: tss
Version: 0.8.1-3
Severity: critical
Tags: security
Justification: root security hole
tss has a setuid binary. The source code is src/main.c:
sprintf(glob_string, "%s/.tss/*", getenv("HOME"));
(before dropping setuid, needless to say)
Helmut
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, ''unstable''), (500,
''testing''), (1, ''experimental'')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.23.14 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Versions of packages tss depends on:
ii libc6 2.7-10 GNU C Library: Shared libraries
ii libncurses5 5.6+20080405-1 Shared libraries for terminal hand
tss recommends no packages.