Debian: lv privilege escalation vulnerability

    Date16 May 2003
    CategoryDebian
    2435
    Posted ByLinuxSecurity Advisories
    lv reads options from a configuration file in the current directory. Because such a file could be placed there by a malicious user, and lv configuration options can be used to execute commands, this represented a security vulnerability.
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 304-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    May 15th, 2003                           http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : lv
    Vulnerability  : privilege escalation
    Problem-Type   : local
    Debian-specific: no
    CVE Id         : CAN-2003-0188
    
    Leonard Stiles discovered that lv, a multilingual file viewer, would
    read options from a configuration file in the current directory.
    Because such a file could be placed there by a malicious user, and lv
    configuration options can be used to execute commands, this
    represented a security vulnerability.  An attacker could gain the
    privileges of the user invoking lv, including root.
    
    For the stable distribution (woody) this problem has been fixed in
    version 4.49.4-7woody2.
    
    For the old stable distribution (potato) this problem has been fixed
    in version 4.49.3-4potato2.
    
    For the unstable distribution (sid) this problem is fixed in version
    4.49.5-2.
    
    We recommend that you update your lv package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2.dsc
          Size/MD5 checksum:      575 fb13ca58c57ecaf4ba2fb65d7658fcc8
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2.diff.gz
          Size/MD5 checksum:    18681 32e2cd190001661fd18f0c48859764ea
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_alpha.deb
          Size/MD5 checksum:   431152 624b9c4e19de8d8f0c7308deaf5086b9
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_arm.deb
          Size/MD5 checksum:   418696 8e4abd0925b67bba2bddb217bd16c2d1
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_i386.deb
          Size/MD5 checksum:   414468 8ad1b5cc46b8de88d7391d0295c8b044
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_ia64.deb
          Size/MD5 checksum:   446540 a582ddf25fcf1d355d49369d291c4874
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_hppa.deb
          Size/MD5 checksum:   433536 6781dd5434edf8af607fa4cb9b014bf6
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_m68k.deb
          Size/MD5 checksum:   418074 a33c8f0fbc02aa8955b8506faa4bf2f5
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_mips.deb
          Size/MD5 checksum:   431186 a076010924444a944913020fbb266653
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_mipsel.deb
          Size/MD5 checksum:   426304 91adbaf33f69168b7e7e0ad73cc862b9
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_powerpc.deb
          Size/MD5 checksum:   423248 ee5087e7908ac9a06758bb56fd25eee7
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_s390.deb
          Size/MD5 checksum:   424434 f180c1fddbc2ad9bc990783b0eef970b
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.4-7woody2_sparc.deb
          Size/MD5 checksum:   425480 16ea4b35da3bfeb1b0ba3041bbf3d6d3
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2.dsc
          Size/MD5 checksum:      565 db42be76e5a57c8cb081db3d9c4ae147
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2.diff.gz
          Size/MD5 checksum:     9790 be3d6208663da6e5996fad6281252be3
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_alpha.deb
          Size/MD5 checksum:   435796 b3eb403c39a36033582bfd62f2545570
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_arm.deb
          Size/MD5 checksum:   424328 0effe8f65e7946d43d60f4fdc93f6b6a
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_i386.deb
          Size/MD5 checksum:   420370 45a39fdee604a636c481b7abf7a850e2
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_m68k.deb
          Size/MD5 checksum:   423884 a3d9e01643fc182f6add294a562c4a10
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_powerpc.deb
          Size/MD5 checksum:   429046 7c792417bf68d09fd9ce437f945231d8
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/l/lv/lv_4.49.3-4potato2_sparc.deb
          Size/MD5 checksum:   430938 f724c82306194be0a4e2f1f9bb346170
    
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.