SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Mtools Vendors:   mtools.linux.lu
(Mandrake Issues Fix) Mtools 'mformat' Utility Lets Local Users Create Arbitrary Root-Owned Files
SecurityTracker Alert ID:  1009217
SecurityTracker URL:  http://securitytracker.com/id/1009217
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 26 2004
Impact:   Disclosure of system information, Modification of system information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.9.9
Description:   A vulnerability was reported in mtools in the mformat program. A local user may be able to gain root privileges.

It is reported that when the mformat program is installed with set user id (setuid) root user privileges, a local user can invoke mformat to create any file with 0666 permissions (globally writable).

It is also reported that the application does not drop privileges when reading local configuration files, so a local user may be able to view arbitrary files on the system.

According to the report, the application is installed with setuid privileges on at least some platforms.

Sebastian Krahmer is credited with reporting this flaw.

Impact:   A local user can gain root privileges on the target system.
Solution:   Mandrake has issued a fix.

Mandrake Linux 9.2:
92f97fa2f63b3bcb1f657c919152381e 9.2/RPMS/mtools-3.9.9-2.1.92mdk.i586.rpm
4346ec1081a440772fa3f40f9d07632d 9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm

Mandrake Linux 9.2/AMD64:
11cde05b045fcf389c276199589c051d amd64/9.2/RPMS/mtools-3.9.9-2.1.92mdk.amd64.rpm
4346ec1081a440772fa3f40f9d07632d amd64/9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm

Vendor URL:  mtools.linux.lu (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  9.2

Message History:   This archive entry is a follow-up to the message listed below.
Feb 26 2004 Mtools 'mformat' Utility Lets Local Users Create Arbitrary Root-Owned Files



 Source Message Contents

Subject:  MDKSA-2004:016 - Updated mtools packages fix local root vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandrake Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           mtools
 Advisory ID:            MDKSA-2004:016
 Date:                   February 25th, 2004

 Affected versions:	 9.2
 ______________________________________________________________________

 Problem Description:

 Sebastian Krahmer found that the mformat program, when installed
 suid root, can create any file with 0666 permissions as root, and that
 it also does not drop privileges when reading local configuration
 files.
 
 The updated packages remove the suid bit from mformat.
 ______________________________________________________________________

 Updated Packages:
  
 Mandrake Linux 9.2:
 92f97fa2f63b3bcb1f657c919152381e  9.2/RPMS/mtools-3.9.9-2.1.92mdk.i586.rpm
 4346ec1081a440772fa3f40f9d07632d  9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm

 Mandrake Linux 9.2/AMD64:
 11cde05b045fcf389c276199589c051d  amd64/9.2/RPMS/mtools-3.9.9-2.1.92mdk.amd64.rpm
 4346ec1081a440772fa3f40f9d07632d  amd64/9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

 All packages are signed by MandrakeSoft for security.  You can obtain
 the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

 Please be aware that sometimes it takes the mirrors a few hours to
 update.

 You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

 MandrakeSoft has several security-related mailing list services that
 anyone can subscribe to.  Information on these lists can be obtained by
 visiting:

  http://www.mandrakesecure.net/en/mlist.php

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAPMgQmqjQ0CJFipgRAoZKAJ4yanFF01W5pgE95GzyLhEPdfcB3gCghdvN
O3xfNlJv2oLUeCjmXBwiw1o=
=ZOTm
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC