First published: Sat Oct 25 2014(Updated: )
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
chkrootkit | <=0.49 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0476 has a medium severity due to its potential for local privilege escalation.
To fix CVE-2014-0476, upgrade chkrootkit to version 0.50 or later.
CVE-2014-0476 affects chkrootkit versions prior to 0.50 and certain versions of Ubuntu Linux.
Local users with access to the system can exploit CVE-2014-0476 to execute arbitrary code.
CVE-2014-0476 is only a vulnerability when the /tmp directory is not mounted with the noexec option.