| Summary: | chkrootkit new security issue CVE-2014-0476 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | pterjan, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/601240/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | chkrootkit-0.49-8.mga4.src.rpm | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 6699 | ||
|
Description
David Walser
2014-06-04 16:02:57 CEST
David Walser
2014-06-04 16:03:06 CEST
Blocks:
(none) =>
6699 Testing complete mga3 32 & 64 From openwall.. -------------- Steps to reproduce: - Put an executable file named 'update' with non-root owner in /tmp (not mounted noexec, obviously) - Run chkrootkit (as uid 0) Result: The file /tmp/update will be executed as root, thus effectively rooting your box, if malicious content is placed inside the file. -------------- Created a file /tmp/update as below and made it executable $ cat /tmp/update #!/bin/bash touch /tmp/vulnerable $ chmod a+x /tmp/update Before ------ $ ll /tmp/update -rwxr-xr-x 1 claire claire 34 Jun 4 16:16 /tmp/update* $ ll /tmp/vulnerable ls: cannot access /tmp/vulnerable: No such file or directory # chkrootkit (for mga3 noted the false positive on Suckit) ... Searching for Suckit rootkit... Warning: /sbin/init INFECTED ... $ ll /tmp/update -rwxr-xr-x 1 claire claire 34 Jun 4 16:16 /tmp/update* $ ll /tmp/vulnerable -rw-r--r-- 1 root root 0 Jun 4 16:20 /tmp/vulnerable Can see it has run the executable with the privileges of the user running chkrootkit (root) and created /tmp/vulnerable owned by root. After ----- Installed the update and removed /tmp/vulnerable # rm /tmp/vulnerable $ ll /tmp/update -rwxr-xr-x 1 claire claire 34 Jun 4 16:16 /tmp/update* $ ll /tmp/vulnerable ls: cannot access /tmp/vulnerable: No such file or directory # chkrootkit (for mga3 checked it fixed the false positive on Suckit. ... Searching for Suckit rootkit... nothing found ... $ ll /tmp/update -rwxr-xr-x 1 claire claire 34 Jun 4 16:16 /tmp/update* $ ll /tmp/vulnerable ls: cannot access /tmp/vulnerable: No such file or directory Clean up.. $ rm /tmp/update Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok
David Walser
2014-06-04 17:56:38 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/601240/ Testing complete mga4 32 & 64 Whiteboard:
MGA3TOO has_procedure mga3-32-ok mga3-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok Validating. Advisory uploaded. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update http://advisories.mageia.org/MGASA-2014-0249.html Status:
NEW =>
RESOLVED |