[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Local exploit in modutils

Title: Local exploit in modutils
Released by: Red Hat
Date: 20th November 2000
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----



- ------------------------------------------------------------------------

Debian Security Advisory                             security@debian.org

http://www.debian.org/security/                         Wichert Akkerman

November 20, 2000

- ------------------------------------------------------------------------





Package: modutils

Vulnerability: local exploit

Debian-specific: no



Sebastian Krahmer found a problem in the modprobe utility that could be

exploited by local users to run arbitrary commands as root if the

machine is running a kernel with kmod enabled.



The kmod kernel feature allows the kernel to dynamically load kernel

modules if functionality is required that is not present in the running

kernel. It does this by invoking the modprobe command with the requested

module as parameter. This parameter can be influenced by users, for

example by opening a currently non-existing files on a devfs filesystem,

or trying to access a non-existing network interface. Since modprobe

did not properly escape shell meta-characters when calling external

commands or check if the last parameters was an option instead of a

modulename, users can cause it to run arbitrary commands.



This has been fixed in version 2.3.11-12 and we recommend that you upgrade

your modutils package immediately.



wget url

will fetch the file for you

dpkg -i file.deb

        will install the referenced file.



You may use an automated update by adding the resources from the

footer to the proper configuration.





Debian GNU/Linux 2.2 alias potato

- ---------------------------------



  Potato was released for the alpha, arm, i386, m68k, powerpc and sparc

  architectures.



  Source archives:

    http://security.debian.org/dists/stable/updates/main/source/modutils_2.3.11-12.diff.gz

      MD5 checksum: 2c9590c014d74728c0c0aca54768a688

    http://security.debian.org/dists/stable/updates/main/source/modutils_2.3.11-12.dsc

      MD5 checksum: 19833dacf3eddfe651a33d95e82bb8c3

    http://security.debian.org/dists/stable/updates/main/source/modutils_2.3.11.orig.tar.gz

      MD5 checksum: f1214811d48ce3662d5957ee599c8057



  Alpha architecture:

    http://security.debian.org/dists/stable/updates/main/binary-alpha/modutils_2.3.11-12_alpha.deb

      MD5 checksum: 44ac46a4689bcbfe2f80ea1d4dcbbd6a



  ARM architecture:

    http://security.debian.org/dists/stable/updates/main/binary-arm/modutils_2.3.11-12_arm.deb

      MD5 checksum: 7f6608a182324509ed24e7289fe4e3cd



  Intel ia32 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-i386/modutils_2.3.11-12_i386.deb

      MD5 checksum: 5050bd60fabb74e1814afc4f91b99e7f



  Motorola 680x0 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-m68k/modutils_2.3.11-12_m68k.deb

      MD5 checksum: 0925f9813b4bd2627e9302b092fcefa0



  PowerPC architecture:

    http://security.debian.org/dists/stable/updates/main/binary-powerpc/modutils_2.3.11-12_powerpc.deb

      MD5 checksum: 5b469eb86dd396de058752c0c053b93d



  Sun Sparc architecture:

    http://security.debian.org/dists/stable/updates/main/binary-sparc/modutils_2.3.11-12_sparc.deb

      MD5 checksum: 988da3bc5908fd6884201b8947f91608



For not yet released architectures please refer to the appropriate

directory http://ftp.debian.org/debian/dists/sid/binary-$arch/ .



- --

- ----------------------------------------------------------------------------

apt-get: deb http://security.debian.org/ stable/updates main

dpkg-ftp:http://security.debian.org/debian-security dists/stable/updates/main

Mailing list: debian-security-announce@lists.debian.org



-----BEGIN PGP SIGNATURE-----

Version: 2.6.3ia

Charset: noconv



iQB1AwUBOhk9W6jZR/ntlUftAQGW+gL9FgiS8cAdKn5ZfGtAeT/45l09F4vKcCaI

APUdQokMRWt1KU81O5PaWbRWYzRmIPh20IQZZ7mRxTbmIH3TLGSQFlU6v6Lkoo3d

V4GSB9UjQ13RyXi/kbClGIWfe+kGuUov

=zVzH

-----END PGP SIGNATURE-----





--

To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org

with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org








(C) 1999-2000 All rights reserved.