GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Jan 27, 2012 3:26 pm Post subject: [ GLSA 201201-15 ] ktsuss: Privilege escalation |
|
|
Gentoo Linux Security Advisory
Title: ktsuss: Privilege escalation (GLSA 201201-15)
Severity: high
Exploitable: local
Date: January 27, 2012
Bug(s): #381115
ID: 201201-15
Synopsis
Two vulnerabilities have been found in ktsuss, allowing local
attackers to gain escalated privileges.
Background
ktsuss is a simple, graphical version of su written in C and GTK+.
Affected Packages
Package: x11-misc/ktsuss
Vulnerable: <= 1.4
Architectures: All supported architectures
Description
Two vulnerabilities have been found in ktuss: - Under specific circumstances, ktsuss skips authentication and fails
to change the effective UID back to the real UID (CVE-2011-2921).
- The GTK interface spawned by the ktsuss binary is run as root
(CVE-2011-2922).
Impact
A local attacker could gain escalated privileges and use the
"GTK_MODULES" environment variable to possibly execute arbitrary code
with root privileges.
Workaround
There is no known workaround at this time.
Resolution
Gentoo discontinued support for ktsuss. We recommend that users unmerge
ktsuss:
Code: | # emerge --unmerge "x11-misc/ktsuss"
|
References
CVE-2011-2921
CVE-2011-2922 |
|