Package: acon
Version: 1.0.5-5
Severity: critical
Tags: security
Justification: root security hole

The package has a setuid binary acon. The binary never drops setuid. The
source code contains the following lines: (acon.c)

char tmp[300];
...
if((env=getenv("HOME")))
        sprintf(tmp,"%s/.acon.conf",env);

This can be easily exploited by a long $HOME.

Helmut

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.23.14 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to