---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Debian Apache Privilege Escalation SECUNIA ADVISORY ID: SA24324 VERIFY ADVISORY: http://secunia.com/advisories/24324/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: A vulnerability has been discovered in Debian, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the apache server retaining the controlling tty on startup. This can be exploited to gain escalated privileges via specially crafted CGI scripts. Successful exploitation makes it possible to gain root privileges, but requires that the apache server is started manually and the invoking root shell is not closed afterwards. The vulnerability is confirmed in the Debian apache server version 1.3.34-4. Other versions may also be affected. SOLUTION: Close the shell when starting or restarting the apache server manually. Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: Dean Gaudet and Richard Thrippleton ORIGINAL ADVISORY: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357561 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------