GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jan 03, 2006 3:26 pm Post subject: [ GLSA 200601-01 ] pinentry: Local privilege escalation |
|
|
Gentoo Linux Security Advisory
Title: pinentry: Local privilege escalation (GLSA 200601-01)
Severity: normal
Exploitable: local
Date: January 03, 2006
Bug(s): #116822
ID: 200601-01
Synopsis
pinentry is vulnerable to privilege escalation.
Background
pinentry is a collection of simple PIN or passphrase entry dialogs which utilize the Assuan protocol.
Affected Packages
Package: app-crypt/pinentry
Vulnerable: < 0.7.2-r2
Unaffected: >= 0.7.2-r2
Architectures: All supported architectures
Description
Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0.
Impact
A user of pinentry could potentially read and overwrite files with a group ID of 0.
Workaround
There is no known workaround at this time.
Resolution
All pinentry users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/pinentry-0.7.2-r2" |
References
CVE-2006-0071
Last edited by GLSA on Sun Jan 14, 2007 4:17 am; edited 5 times in total |
|