Your message dated Tue, 13 Dec 2005 20:59:35 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#343264: [CVE-2004-0564] attackers can overwrite any files
when run with setuid root
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Dec 2005 01:31:08 +0000
>From [EMAIL PROTECTED] Tue Dec 13 17:31:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp108.sbc.mail.re2.yahoo.com ([68.142.229.97])
by spohr.debian.org with smtp (Exim 4.50)
id 1EmLU4-0005vU-Ew
for [EMAIL PROTECTED]; Tue, 13 Dec 2005 17:31:08 -0800
Received: (qmail 48010 invoked from network); 14 Dec 2005 01:30:37 -0000
Received: from unknown (HELO ?192.168.0.2?) ([EMAIL PROTECTED]@64.108.215.162
with plain)
by smtp108.sbc.mail.re2.yahoo.com with SMTP; 14 Dec 2005 01:30:36 -0000
Message-ID: <[EMAIL PROTECTED]>
Date: Tue, 13 Dec 2005 19:30:33 -0600
From: FX <[EMAIL PROTECTED]>
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: [CVE-2004-0564] attackers can overwrite any files when run with setuid
root
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.5 required=4.0 tests=BAYES_01,HAS_PACKAGE,
RCVD_IN_SORBS autolearn=no version=2.60-bugs.debian.org_2005_01_02
package: pppoe
severity: grave
tags: security
Max Vozeler discovered a vulnerability in pppoe, the PPP over Ethernet
driver from Roaring Penguin. When the program is running setuid root, an
attacker could overwrite any file on the file system.
CVE-2004-0564: Roaring Penguin pppoe (rp-ppoe), if installed or
configured to run setuid root contrary to its design, allows local users
to overwrite arbitrary files.
NOTE: the developer has publicly disputed the claim that this is a
vulnerability because pppoe "is NOT designed to run setuid-root."
Therefore this identifier applies *only* to those configurations and
installations under which pppoe is run setuid root despite the
developer's warnings.
This was fixed in Redhat a month ago despite their default configuration
not using suid. See [FLSA-2005:152794]
In Debian Sarge, both /usr/sbin/pppd and /usr/sbin/pppoe files are
"-rwsr-xr-- root dip".
---------------------------------------
Received: (at 343264-done) by bugs.debian.org; 14 Dec 2005 01:59:53 +0000
>From [EMAIL PROTECTED] Tue Dec 13 17:59:53 2005
Return-path: <[EMAIL PROTECTED]>
Received: from pianocktail.org ([66.11.160.92])
by spohr.debian.org with smtp (Exim 4.50)
id 1EmLvt-00042n-59
for [EMAIL PROTECTED]; Tue, 13 Dec 2005 17:59:53 -0800
Received: (qmail 3457 invoked from network); 14 Dec 2005 01:58:39 -0000
Received: from unknown (HELO ?10.0.10.2?) (10.0.10.2)
by pianocktail.org with SMTP; 14 Dec 2005 01:58:39 -0000
Message-ID: <[EMAIL PROTECTED]>
Date: Tue, 13 Dec 2005 20:59:35 -0500
From: Christian Hudon <[EMAIL PROTECTED]>
User-Agent: Thunderbird 1.5 (Windows/20051025)
MIME-Version: 1.0
To: FX <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Bug#343264: [CVE-2004-0564] attackers can overwrite any files
when run with setuid root
References: <[EMAIL PROTECTED]>
In-Reply-To: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
FX wrote:
> Max Vozeler discovered a vulnerability in pppoe, the PPP over Ethernet
> driver from Roaring Penguin. When the program is running setuid root,
> an attacker could overwrite any file on the file system.
This is rather old and was fixed more than a year ago in Debian:
Date: Wed, 29 Sep 2004 22:08:20 -0400
Source: rp-pppoe
Binary: pppoe
Architecture: source i386
Version: 3.5-4
Distribution: unstable
Urgency: high
Maintainer: Christian Hudon <[EMAIL PROTECTED]>
Changed-By: Christian Hudon <[EMAIL PROTECTED]>
Description:
pppoe - PPP over Ethernet driver
Changes:
rp-pppoe (3.5-4) unstable; urgency=high
.
* Added patch by Max Vozeler <[EMAIL PROTECTED]> to ignore -D and -p
when pppoe is not running as root to prevent a potential root
compromise by users in group dip when pppoe is running setuid root.
[src/pppoe.c, CAN-2004-0564] Note that group dip is empty by default
on Debian installs.
Christian
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]