Package: bristol
Version: 0.60.5-1+b1
Severity: grave
Tags: security
Usertags: ldpath


During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary

The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by to look for
libraries on a directory other than the standard paths.

Vulnerable code follows:

/usr/bin/startBristol line 350:
export LD_LIBRARY_PATH=/usr/local/lib:usr/lib:${LD_LIBRARY_PATH}:${BRISTOL}/lib

When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this

Note that there's also a missing slash on the second entry (_usr_/lib.)

This vulnerability has been assigned the CVE id CVE-2010-3351. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)


Raphael Geissert

pkg-multimedia-maintainers mailing list

Reply via email to