https://bugzilla.novell.com/show_bug.cgi?id=647353
https://bugzilla.novell.com/show_bug.cgi?id=647353#c0 Summary: [PATCH] CVE-2010-3369: insecure library loading in files build/mdb{.in,-symbolreader.in} Classification: Mono Product: Mono: Debugger Version: 2.6.x Platform: Other OS/Version: Linux Status: NEW Severity: Major Priority: P5 - None Component: cli AssignedTo: [email protected] ReportedBy: [email protected] QAContact: [email protected] Found By: --- Blocker: --- Created an attachment (id=395417) --> (http://bugzilla.novell.com/attachment.cgi?id=395417) CVE-2010-3369 Security patch User-Agent: Opera/9.80 (X11; Linux x86_64; U; en) Presto/2.6.30 Version/10.62 >From http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598299 Package: vdr-dbg Version: 1.6.0-18 Severity: grave Tags: security User: [email protected] Usertags: ldpath Hello, During a review of the Debian archive, I've found your package to contain a script that can be abused by an attacker to execute arbitrary code. The vulnerability is introduced by an insecure change to LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for libraries on a directory other than the standard paths. Vulnerable code follows: /usr/bin/vdrleaktest line 73: LANG=C LD_LIBRARY_PATH="/usr/lib/debug;$LD_LIBRARY_PATH" \ valgrind --tool=memcheck --leak-check=yes --num-callers=20 \ --suppressions=/usr/share/vdr/valgrind.supp \ /usr/bin/vdr-dbg -v $VIDEO_DIR -c $CFG_DIR -L $PLUGIN_DIR -r $REC_CMD \ -E $EPG_FILE -g /tmp $OPTIONS --port $SVDRP_PORT --lirc \ "$@" When there's an empty item on the colon-separated list of LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.) If the given script is executed from a directory where a potential, local, attacker can write files to, there's a chance to exploit this bug. This vulnerability has been assigned the CVE id CVE-2010-3387. Please make sure you mention it when forwarding this report to upstream and when fixing this bug (everywhere: upstream and here at Debian.) [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3387 [1] http://security-tracker.debian.org/tracker/CVE-2010-3387 Sincerely, Raphael Geissert Reproducible: Always Steps to Reproduce: 1. See above report 2. 3. Actual Results: Security issue -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the QA contact for the bug. _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
