First published: Fri Jun 15 2012(Updated: )
Florian Weimer found a local file disclosure flaw in accountsservice, an account management system using D-Bus for querying and manipulating user accounts. The implementation of the SetIconFile method of the org.freedesktop.Accounts.User D-Bus interface can disclose arbitrary files due to a race condition in user_change_icon_file_authorized_cb() in /usr/libexec/accounts-daemon. When this function calls get_caller_uid(), it uses PolicyKit to obtain the UID of the requesting process from /proc. At the time the UID is fetched, it may not match the original UID making the D-Bus request if the process has executed an SUID binary.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
accountsservice | <=0.6.21 | |
accountsservice | =0.4 | |
accountsservice | =0.5 | |
accountsservice | =0.6 | |
accountsservice | =0.6.1 | |
accountsservice | =0.6.2 | |
accountsservice | =0.6.3 | |
accountsservice | =0.6.4 | |
accountsservice | =0.6.5 | |
accountsservice | =0.6.6 | |
accountsservice | =0.6.7 | |
accountsservice | =0.6.8 | |
accountsservice | =0.6.9 | |
accountsservice | =0.6.10 | |
accountsservice | =0.6.11 | |
accountsservice | =0.6.12 | |
accountsservice | =0.6.13 | |
accountsservice | =0.6.14 | |
accountsservice | =0.6.15 | |
accountsservice | =0.6.16 | |
accountsservice | =0.6.17 | |
accountsservice | =0.6.18 | |
accountsservice | =0.6.19 | |
accountsservice | =0.6.20 |
http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.