Maildrop Local Users Gain Elevated Group Privileges

2010.02.06
Risk: High
Local: Yes
Remote: No
CWE: CWE-264


CVSS Base Score: 6.9/10
Impact Subscore: 10/10
Exploitability Subscore: 3.4/10
Exploit range: Local
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

maildrop could allow a local attacker to gain elevated privileges, caused by improper restrictions set on supplementary groups when compiled without RESET_GID. A local attacker could exploit this vulnerability to gain elevated privileges and perform arbitrary tasks on the application with root privileges.

References:

https://bugzilla.redhat.com/show_bug.cgi?id=559681
http://xforce.iss.net/xforce/xfdb/55980
http://www.debian.org/security/2010/dsa-1981
http://www.courier-mta.org/maildrop/changelog.html
http://securitytracker.com/id?1023515
http://secunia.com/advisories/38374
http://secunia.com/advisories/38367
http://marc.info/?l=oss-security&m=126468618017829&w=2
http://marc.info/?l=oss-security&m=126468551017070&w=2
http://marc.info/?l=oss-security&m=126468324913920&w=2
http://marc.info/?l=oss-security&m=126462927918840&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564601


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top