First published: Wed May 02 2007(Updated: )
Description of problem: When creating a file, open()/creat() allows the setgid bit to be set via the mode argument even when, due to the bsdgroups mount option or the file being created in a setgid directory, the new file's group is one which the user is not a member of. The user can then use ftruncate() and memory-mapped I/O to turn the new file into an arbitrary binary and thus gain the privileges of this group, since these operations do not clear the setgid bit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-92.1.18.el5 | 0:2.6.18-92.1.18.el5 |
Linux kernel | <=2.6.21.7 | |
Linux kernel | =2.2.27 | |
Linux kernel | =2.4.36 | |
Linux kernel | =2.4.36.1 | |
Linux kernel | =2.4.36.2 | |
Linux kernel | =2.4.36.3 | |
Linux kernel | =2.4.36.4 | |
Linux kernel | =2.4.36.5 | |
Linux kernel | =2.4.36.6 | |
Linux kernel | =2.6 | |
Linux kernel | =2.6.18 | |
Linux kernel | =2.6.18-rc1 | |
Linux kernel | =2.6.18-rc2 | |
Linux kernel | =2.6.18-rc3 | |
Linux kernel | =2.6.18-rc4 | |
Linux kernel | =2.6.18-rc5 | |
Linux kernel | =2.6.18-rc6 | |
Linux kernel | =2.6.18-rc7 | |
Linux kernel | =2.6.19.4 | |
Linux kernel | =2.6.19.5 | |
Linux kernel | =2.6.19.6 | |
Linux kernel | =2.6.19.7 | |
Linux kernel | =2.6.20.16 | |
Linux kernel | =2.6.20.17 | |
Linux kernel | =2.6.20.18 | |
Linux kernel | =2.6.20.19 | |
Linux kernel | =2.6.20.20 | |
Linux kernel | =2.6.20.21 | |
Linux kernel | =2.6.21.5 | |
Linux kernel | =2.6.21.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2008-4210 is classified as a medium severity vulnerability due to its potential to allow unauthorized file permissions.
To fix CVE-2008-4210, update the kernel to a version that includes the patch addressing this vulnerability.
CVE-2008-4210 affects various Linux kernel versions, including 2.6.18 through 2.6.21.7 and several other specific versions.
CVE-2008-4210 primarily requires local access to the system for exploitation, making it less of a remote threat.
Exploitation of CVE-2008-4210 could lead to unauthorized access to files by manipulating setgid permissions.