GDM TOCTTOU race condition on /tmp/.X11-unix

2013.09.06
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-59


CVSS Base Score: 6.9/10
Impact Subscore: 10/10
Exploitability Subscore: 3.4/10
Exploit range: Local
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

As per the distros@ list recommendations, I'm writing to alert of a problem with older versions of GDM. As per our bugzilla [1]: Vladz reported that GDM versions < 2.21.1 were vulnerable to a TOCTTOU (time of check to time of use) flaw in the way that GDM checked for the existence of, and created if missing, the /tmp/.X11-unix/ special directory. A local attacker could use this flaw to overwrite arbitrary file contents via symbolic link attacks or to manipulate the contents of arbitrary files, including those files owned by the root user that would normally be inaccessible. This is because GDM will chown /tmp/.X11-unix to the user and group root, but also changes the permissions to 1777. Newer versions of GDM no longer create the /tmp/.X11-unix/ directory and are thus not vulnerable to this flaw. This issue was assigned CVE-2013-4169. We fixed the problem by having rc.sysinit pre-create /tmp/.X11-unix at boot, like it does for /tmp/.ICE-unix (and removing the offending code from GDM). [1] https://bugzilla.redhat.com/show_bug.cgi?id=988498

References:

https://bugzilla.redhat.com/show_bug.cgi?id=988498


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top