Security hole in i4l (xmonisdn)

    Date08 Dec 1999
    CategorySuSE
    2851
    Posted ByLinuxSecurity Advisories
    xmonisdn which is part of the i4l package is installed setuid root by default. To control and display the status of the ISDN network connections xmonisdn uses external programs, which are executed by the system() systemcall, without taking care of a safe environment. The problem arises by old libc, that don't overwrite the IFS environment variable.
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
            Package:  i4l (xmonisdn)
            Date:     Wed Aug 18 10:39:00 CEST 1999
            Affected: all Linux distributions using xmonisdn in conjunction
                      with old libc
    
    ______________________________________________________________________________
    
    A security hole was discovered in the package mentioned above.
    Please update as soon as possible or disable the service if you are using
    this software on your SuSE Linux installation(s).
    
    Other Linux distributions or operating systems might be affected as
    well, please contact your vendor for information about this issue.
    
    Please note, that that we provide this information on as "as-is" basis only.
    There is no warranty whatsoever and no liability for any direct, indirect or
    incidental damage arising from this information or the installation of
    the update package.
    
    ______________________________________________________________________________
    
    1. Problem Description
    
        xmonisdn which is part of the i4l package is installed setuid root
        by default.
        To control and display the status of the ISDN network connections
        xmonisdn uses external programs, which are executed by the system()
        systemcall, without taking care of a safe environment.
        The problem arises by old libc, that don't overwrite the IFS environment
        variable.
    
    2. Impact
    
        By manipulating the IFS (or PATH) environment variable an attacker is
        able to execute his own programs with root privileges.
    
    3. Solution
    
        A temporary fix:
          /bin/chmod u-s /usr/bin/xmonisdn
    
        Install the updated package, as soon as it is available from our
        ftp server.
    
    ______________________________________________________________________________
    
    Webpage for patches:
            http://www.suse.de/patches/index.html
    
    or try the following web pages for a list of mirrors:
    
            http://www.suse.de/ftp.html
            http://www.suse.com/ftp_new.html
    
    ______________________________________________________________________________
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.