First published: Mon Jul 26 2004(Updated: )
Quoting first paragraph from [1]: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED RAWHIDE - Need to call setsid() when starting daemons to prevent TIOCSTI attacks" href="show_bug.cgi?id=173008">https://bugzilla.redhat.com/show_bug.cgi?id=173008</a> for issue description: ====================== When starting a program via "su - user -c program" the user session can escape to the parent session by using the TIOCSTI ioctl to push characters into the input buffer. This allows for example a non-root session to push "chmod 666 /etc/shadow" or similarly bad commands into the input buffer such that after the end of the session they are executed. References: [1] <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED RAWHIDE - Need to call setsid() when starting daemons to prevent TIOCSTI attacks" href="show_bug.cgi?id=173008">https://bugzilla.redhat.com/show_bug.cgi?id=173008</a> [2] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo Project Sudo | >=1.3.0<=1.7.4 | |
Debian shadow | >=4.0.0<=4.1.5 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =4 | |
Redhat Enterprise Linux | =5 | |
debian/shadow | 1:4.8.1-1 1:4.13+dfsg1-1 1:4.15.3-2 1:4.16.0-4 | |
debian/sudo | 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.15p5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.