First published: Mon Oct 06 2014(Updated: )
It was reported that sddm has several issues leading to local privilege escalation: [1] The xauth cookie handling code calls xauth binary via popen() as root, which in turn dumps and creates files as root in users ~. [2] After xauth has done its job, sddm chowns() the ~/.Xauthority file to user. This is a race and a local root exploit. [3] The .xsession-errors file is created in ~ but as root. This allows to destroy arbitrary system files. Upstream patch is at [4]. [1] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c7">https://bugzilla.suse.com/show_bug.cgi?id=897788#c7</a> [2] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c8">https://bugzilla.suse.com/show_bug.cgi?id=897788#c8</a> [3] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c9">https://bugzilla.suse.com/show_bug.cgi?id=897788#c9</a> [4] <a href="https://github.com/sddm/sddm/pull/280">https://github.com/sddm/sddm/pull/280</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SDDM Project SDDM | <0.10.0 | |
Fedora | =20 | |
Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7272 has been classified as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2014-7272, update SDDM to a version greater than 0.10.0 to mitigate the vulnerability.
CVE-2014-7272 affects SDDM versions prior to 0.10.0 as well as Fedora versions 20 and 21.
CVE-2014-7272 is a local privilege escalation vulnerability related to improper handling of xauth cookies.
No, CVE-2014-7272 is a local vulnerability that requires access to the affected system for exploitation.