Vulnerability Note VU#153653

Linux dump uses environment variables insecurely, allowing for root compromise

Original Release date: 21 Aug 2001 | Last revised: 21 Aug 2001

Overview

Some implementations of the Linux backup utility, dump, call external programs on remote machines via the RSH environment variable. This may permit an attacker to compromise root if dump is setuid root.

Description

Some implementations of the Linux backup utility, dump, permit use of backup devices on remote machines via an access program on the local machine. This access program is identified in the RSH environment variable. The value in the environment variable is not validated for security prior to its use in calling a program. In some implementations, dump is protected setuid root.

Impact

By specifying a shell script of their own devising, malicious local users can exploit the setuid protection on dump to secure root access for themselves to execute arbitrary commands.

Solution

Apply vendor patches; see the Systems Affected section below.

Remove suid protection from dump.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RedHatAffected31 Oct 200003 Jul 2001
ConectivaNot Affected31 Oct 200003 Jul 2001
DebianNot Affected16 Jul 200123 Jul 2001
EngardeNot Affected16 Jul 200123 Jul 2001
MandrakeSoftNot Affected31 Oct 200003 Jul 2001
OpenBSDNot Affected16 Jul 200116 Jul 2001
SGINot Affected16 Jul 200116 Jul 2001
Hewlett PackardUnknown16 Jul 200107 Aug 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was first reported throught discussion on Bugtraq

This document was last modified by Tim Shimeall.

Other Information

  • CVE IDs: CAN-2000-1009
  • Date Public: 31 Oct 2000
  • Date First Published: 21 Aug 2001
  • Date Last Updated: 21 Aug 2001
  • Severity Metric: 18.88
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.