First published: Sun Sep 11 2011(Updated: )
Description of problem: Between F14 and F15, NetworkManager was changed so that unprivileged console users can store both personal and system connections via the ifcfg-rh plugin. As a result, <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - ifcfg plugin can write connection name containing newlines, corrupting file" href="show_bug.cgi?id=682290">bug 682290</a> now constitutes a vulnerability allowing such users to escalate to root. To avoid calling attention to this, I am filing a separate bug rather than updating <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - ifcfg plugin can write connection name containing newlines, corrupting file" href="show_bug.cgi?id=682290">bug 682290</a>. Version-Release number of selected component (if applicable): NetworkManager-0.9.0-1.fc15 How reproducible: Always Steps to Reproduce (as an unprivileged console user): 1. Create a wired connection named `test'. 2. Change the name to `test\nUSERCTL=true\n/bin/bash', where `\n' stands for a newline entered via Ctrl-Shift-U, A. 3. usernetctl test up Actual results: Root shell. Expected results: Format integrity of /etc/sysconfig/network-scripts/ifcfg-test is maintained.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME NetworkManager | =0.8.1 | |
GNOME NetworkManager | =0.9.1 | |
GNOME NetworkManager | =0.9.0 | |
Gnome Ifcfg-rh Plug-in | ||
GNOME NetworkManager | =0.8.1 | |
GNOME NetworkManager | =0.9.0 | |
GNOME NetworkManager | =0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.