First published: Tue Sep 10 2013(Updated: )
Created <span class="bz_obsolete"><a href="attachment.cgi?id=795808&action=diff" name="attach_795808" title="preliminary patch to set credentials before execve">attachment 795808</a> <a href="attachment.cgi?id=795808&action=edit" title="preliminary patch to set credentials before execve">[details]</a></span> preliminary patch to set credentials before execve Description of problem: If a tcpmux service is enabled, the user and group directives are ignored and the service always runs as root. Verified in the xinetd codebase and affects all active versions of RHEL and Fedora. Without the fix for <a href="https://access.redhat.com/security/cve/CVE-2012-0862">CVE-2012-0862</a>, previously exposed non-tcpmux services could run as root bypassing their respective user and group restrictions. Version-Release number of selected component (if applicable): 2.3.15-6 How reproducible: Always Steps to Reproduce: 1. Enabled tcpmux-server 2. Create a sample tcpmux service service testcred { id = tcpmux-testcred disable = no user = nobody group = nobody socket_type = stream type = TCPMUXPLUS UNLISTED flags = NAMEINARGS server = /usr/bin/id server_args = id wait = no } 3. telnet localhost 1 4. type testcred Actual results: Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. testcred +Go uid=0(root) gid=0(root) groups=0(root) Expected results: Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. testcred +Go uid=99(nobody) gid=99(nobody) groups=99(nobody) Additional info:
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xinetd Xinetd | ||
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.