First published: Fri Jun 15 2012(Updated: )
Florian Weimer found a local file disclosure flaw in accountsservice, an account management system using D-Bus for querying and manipulating user accounts. The implementation of the SetIconFile method of the org.freedesktop.Accounts.User D-Bus interface can disclose arbitrary files due to a race condition in user_change_icon_file_authorized_cb() in /usr/libexec/accounts-daemon. When this function calls get_caller_uid(), it uses PolicyKit to obtain the UID of the requesting process from /proc. At the time the UID is fetched, it may not match the original UID making the D-Bus request if the process has executed an SUID binary.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Accountsservice |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-832532 is considered high due to its potential for local file disclosure.
To mitigate REDHAT-BUG-832532, update to the latest version of accountsservice that contains the fix.
REDHAT-BUG-832532 affects the freedesktop accountsservice system.
REDHAT-BUG-832532 is a local file disclosure vulnerability found in accountsservice.
No, REDHAT-BUG-832532 is categorized as a local vulnerability and cannot be exploited remotely.