SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   slocate Vendors:   Lindsay, Kevin
(Trustix Issues Fix) slocate Buffer Management Error May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1008809
SecurityTracker URL:  http://securitytracker.com/id/1008809
CVE Reference:   CVE-2003-0848   (Links to External Site)
Date:  Jan 21 2004
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.6 and prior versions
Description:   A buffer management vulnerability was reported in slocate. A local user may be able to gain elevated privileges on the target system.

Patrik Hornik reported that a heap overflow may let a local user execute arbitrary code with 'slocate' group privileges. The flaw reportedly resides in 'main.c', where some dynamically allocated memory may not be properly freed.

Impact:   A local user may be able to cause arbitrary code to be executed with set group id (setgid) 'slocate' privileges. With those privileges, the local user can view a list of all files on the system.
Solution:   Trustix has released a fix, available at:

http://http.trustix.org/pub/trustix/updates/
ftp://ftp.trustix.org/pub/trustix/updates/

The MD5sums of the packages are:

6e170882ef40ea6ae1df77e71a31ce3c 1.5/rpms/slocate-2.7-1tr.i586.rpm
0f68f217f6535003f28b341667cc0d75 1.5/srpms/slocate-2.7-1tr.src.rpm
2a10a4c4542eb42fe6e82745e9ea52c0 2.0/rpms/slocate-2.7-1tr.i586.rpm
b76260e4c12a7127b9cb5a0391ac6cb4 2.0/srpms/slocate-2.7-1tr.src.rpm

SWUP tool users can update automatically using 'swup --upgrade'.

Vendor URL:  www.geekreview.org/slocate/ (Links to External Site)
Cause:   Boundary error, State error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  1.5, 2.0

Message History:   This archive entry is a follow-up to the message listed below.
Oct 6 2003 slocate Buffer Management Error May Let Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  TSLSA-2004-0005 - slocate


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0005

Package name:      slocate
Summary:           possible privilege elevation
Date:              2004-01-21
Affected versions: Trustix 1.5, 2.0

- --------------------------------------------------------------------------
Package description:
  Slocate is a security-enhanced version of locate. Just like locate,
  slocate searches through a central database (which is updated nightly)
  for files which match a given pattern. Slocate allows you to quickly
  find files anywhere on your system.


Problem description:
  Mr. Patrik Hornik discovered a buffer overflow vulnerability in slocate
  version 2.6.  The vulnerability corrupts heap management structures and
  possibly leads to gaining slocate group privileges, which allows reading
  the global slocate database and thus obtaining a list of all files in the
  system by an unauthorized user.
  
  For further description, see CAN-2003-0848 at http://cve.mitre.org/


Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix are made available for public testing some time
  before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/cloud/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-1.5/> and
  <URI:http://www.trustix.org/errata/trustix-2.0/>
  or directly at
  <URI:http://www.trustix.org/errata/misc/2004/TSL-2004-0005-slocate.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
6e170882ef40ea6ae1df77e71a31ce3c  1.5/rpms/slocate-2.7-1tr.i586.rpm
0f68f217f6535003f28b341667cc0d75  1.5/srpms/slocate-2.7-1tr.src.rpm
2a10a4c4542eb42fe6e82745e9ea52c0  2.0/rpms/slocate-2.7-1tr.i586.rpm
b76260e4c12a7127b9cb5a0391ac6cb4  2.0/srpms/slocate-2.7-1tr.src.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFADnPgi8CEzsK9IksRAh1wAJ9HF2VeuWQBIrHn8c6dQPvdf2YGmACeIC4U
b0rhaUbts4NO4NavZEwUKtU=
=DfEo
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo/tsl-announce

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC