Date: Sat, 30 Apr 2011 22:00:48 -0400 From: William Cohen <wcohen@...hat.com> To: oss-security <oss-security@...ts.openwall.com> CC: Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, Stephane Chauveau <stephane.chauveau@...s-entreprise.com>, Maynard Johnson <maynardj@...ibm.com>, Robert Richter <robert.richter@....com> Subject: Re: CVE Request -- oprofile -- Local privilege escalation via crafted opcontrol event parameter when authorized by sudo On 04/29/2011 02:16 PM, Jan Lieskovsky wrote: > > Hello Josh, Steve, vendors, > > It was found that oprofile profiling system did not properly sanitize > the content of event argument, provided to oprofile profiling control > utility (opcontrol). If a local unprivileged user was authorized by > sudoers file to run the opcontrol utility, they could use the flaw > to escalate their privileges (execute arbitrary code with the privileges > of the privileged system user, root). Different vulnerability than > CVE-2006-0576. > > References: >  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212 >  https://bugzilla.redhat.com/show_bug.cgi?id=700883 > > Could you allocate a CVE id for this? > > Thank you & Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team > > P.S.: Oprofile is not encouraged to be run under sudo, but still > should not allow escalation of privileges. I don't know if this is the best way to fix this issue, but attached is a patch that filters out all but alpha numeric characters and '_'. Feedback on the patch would be appreciated. -Will View attachment "oprof-sanitize.patch" of type "text/x-patch" (792 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.