Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
cdrtools: Local root vulnerability in cdrecord if set SUID root
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-18
(cdrtools: Local root vulnerability in cdrecord if set SUID root)
Max Vozeler discovered that the cdrecord utility, when set to SUID root,
fails to drop root rights before executing a user-supplied RSH program.
By default, Gentoo does not ship the cdrecord utility as SUID root and
therefore is not vulnerable. However, many users (and CD-burning
front-ends) set this manually after installation.
A local attacker could specify a malicious program using the $RSH
environment variable and have it executed by the SUID cdrecord, resulting
in root rights escalation.
As a workaround, you could remove the SUID rights from your cdrecord
# chmod a-s /usr/bin/cdrecord
All cdrtools users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1"
# emerge ">=app-cdr/cdrtools-2.01_alpha37-r1"
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|DELL POWEREDGE R730XD SERVER 12 BAY E5-2670V3 2.3GHZ 16GB 2 X 3TB SAS 2 X 300GB
|DELL POWEREDGE R730XD SERVER 12 BAY E5-2698V4 2.2GHz 64GB 4TB SATA 2 X 300GB 10K
|DELL POWEREDGE C6320 4 NODE 4 X E5-2620V4 2.1GHZ 256GB 8 X 1.6TB SSD
|DELL POWEREDGE C6320 4 NODE 4 X E5-2620V4 2.1GHZ 256GB 16 X 600GB SSD
No Discussions have been posted on this vulnerability.