---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Debian debian-goodies Command Execution Vulnerability SECUNIA ADVISORY ID: SA26675 VERIFY ADVISORY: http://secunia.com/advisories/26675/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Thomas de Grenier de Latour has discovered a vulnerability in the debian-goodies package for Debian Linux, which can be exploited by malicious, local users to perform actions with escalated privileges. The vulnerability is caused due to an input validation error within the "checkrestart" script when reading the process list. This can be exploited to execute commands with "root" privileges by invoking a program with a specially crafted file name and an administrative user executes "checkrestart". The vulnerability is confirmed in version 0.27 included in Debian stable and reported in 0.33. Other versions may also be affected. SOLUTION: Fixed in debian-goodies 0.34 included in Debian unstable. Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: Thomas de Grenier de Latour ORIGINAL ADVISORY: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440411 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------