![]() |
|
Message-ID: <BANLkTik0K6GQbaezekbRNb1+7EersnxRKg@mail.gmail.com> Date: Mon, 6 Jun 2011 16:39:06 -0400 From: Michael Gilbert <michael.s.gilbert@...il.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request -- coreutils -- tty hijacking possible in "su" via TIOCSTI ioctl On Mon, Jun 6, 2011 at 1:22 PM, Josh Bressers wrote: > ----- Original Message ----- >> Hello Josh, Steve, vendors, >> >> based on Debian BTS report: >> [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843 >> (first CVE-2011-XXYY required for Debian case) >> >> looked more into original report: >> [2] https://bugzilla.redhat.com/show_bug.cgi?id=173008 >> >> and the first paragraph of [2] suggests: >> "When starting a program via "su - user -c program" the user session >> can escape to the parent session by using the TIOCSTI ioctl to push >> characters into the input buffer. This allows for example a non-root >> session to push "chmod 666 /etc/shadow" or similarly bad commands into >> the input buffer such that after the end of the session they are >> executed." >> >> this should get a CVE-2005-YYZZ CVE id. >> > > This really shouldn't get a CVE id. It's well known, and sadly not easy to > fix. There are more details in this bug: > https://bugzilla.redhat.com/show_bug.cgi?id=479145 > > I would classify this as an administration issue, not a flaw in su or sudo. > If you're running arbitrary things, you're in far more trouble than this. > > I'm happy to let MITRE overrule me. There is a real exposure here (although somewhat minor), and there are existing patches that clearly bound/fix the problem, so it should get an id (in my opinion of course). Best wishes, Mike
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.