TITLE: Debian xmcdconfig Insecure Directory Permissions SECUNIA ADVISORY ID: SA20078 VERIFY ADVISORY: http://secunia.com/advisories/20078/ CRITICAL: Not critical IMPACT: Security Bypass, DoS WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Justin B Rye has discovered a security issue in xmcdconfig, which can be exploited by malicious, local users to bypass certain security restrictions and potentially cause a DoS (Denial of Service). The problem is caused by the "/usr/sbin/xmcdconfig" script setting certain directory permissions to world-writable in "/var/lib/cddb" and "/var/lib/xmcd/discog". This can potentially be exploited to cause a DoS by filling up the /var/log partition. The security issue has been confirmed in version 2.6-17 (Debian/stable) and 2.6-17.1 (Debain/testing). Other versions may also be affected. SOLUTION: Set appropriate permissions for the directories created under "/var/lib/cddb" and "/var/lib/xmcd/discog" after running xmcdconfig. PROVIDED AND/OR DISCOVERED BY: Justin B Rye ORIGINAL ADVISORY: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366816 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------