First published: Wed Jan 16 2008(Updated: )
The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =7.0-pre-release | |
FreeBSD Kernel | =6.1 | |
FreeBSD Kernel | =5.5 | |
FreeBSD Kernel | =7.0 | |
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.2 | |
FreeBSD Kernel | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0217 has a medium severity rating due to its potential to expose sensitive user data.
To fix CVE-2008-0217, ensure that the script program is executed with root privileges to prevent the creation of world-readable and writable pseudo-terminals.
FreeBSD versions 5.0 through 7.0-PRERELEASE are affected by CVE-2008-0217.
Yes, local users can exploit CVE-2008-0217 to read data from another user's terminal.
A known mitigation for CVE-2008-0217 is to restrict the use of the script program to trusted users only.