You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
72 lines
2.3 KiB
72 lines
2.3 KiB
13 years ago
|
<?xml version="1.0" encoding="utf-8"?>
|
||
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||
|
|
||
|
<glsa id="200512-18">
|
||
|
<title>XnView: Privilege escalation</title>
|
||
|
<synopsis>
|
||
|
XnView may search for shared libraries in an untrusted location,
|
||
|
potentially allowing local users to execute arbitrary code with the
|
||
|
privileges of another user.
|
||
|
</synopsis>
|
||
|
<product type="ebuild">xnview</product>
|
||
|
<announced>December 30, 2005</announced>
|
||
|
<revised>May 22, 2006: 02</revised>
|
||
|
<bug>117063</bug>
|
||
|
<access>local</access>
|
||
|
<affected>
|
||
|
<package name="x11-misc/xnview" auto="yes" arch="x86">
|
||
|
<unaffected range="ge">1.70-r1</unaffected>
|
||
|
<vulnerable range="lt">1.70-r1</vulnerable>
|
||
|
</package>
|
||
|
</affected>
|
||
|
<background>
|
||
|
<p>
|
||
|
XnView is an efficient multimedia viewer, browser and converter,
|
||
|
distributed free for non-commercial use.
|
||
|
</p>
|
||
|
</background>
|
||
|
<description>
|
||
|
<p>
|
||
|
Krzysiek Pawlik of Gentoo Linux discovered that the XnView package for
|
||
|
IA32 used the DT_RPATH field insecurely, causing the dynamic loader to
|
||
|
search for shared libraries in potentially untrusted directories.
|
||
|
</p>
|
||
|
</description>
|
||
|
<impact type="normal">
|
||
|
<p>
|
||
|
A local attacker could create a malicious shared object that would be
|
||
|
loaded and executed when a user attempted to use an XnView utility.
|
||
|
This would allow a malicious user to effectively hijack XnView and
|
||
|
execute arbitrary code with the privileges of the user running the
|
||
|
program.
|
||
|
</p>
|
||
|
</impact>
|
||
|
<workaround>
|
||
|
<p>
|
||
|
The system administrator may use the chrpath utility to remove the
|
||
|
DT_RPATH field from the XnView utilities:
|
||
|
</p>
|
||
|
<code>
|
||
|
# emerge app-admin/chrpath
|
||
|
# chrpath --delete /opt/bin/nconvert /opt/bin/nview /opt/bin/xnview</code>
|
||
|
</workaround>
|
||
|
<resolution>
|
||
|
<p>
|
||
|
All XnView users on the x86 platform should upgrade to the latest
|
||
|
version:
|
||
|
</p>
|
||
|
<code>
|
||
|
# emerge --sync
|
||
|
# emerge --ask --oneshot --verbose ">=x11-misc/xnview-1.70-r1"</code>
|
||
|
</resolution>
|
||
|
<references>
|
||
|
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4595">CVE-2005-4595</uri>
|
||
|
</references>
|
||
|
<metadata tag="submitter" timestamp="Thu, 29 Dec 2005 17:05:23 +0000">
|
||
|
taviso
|
||
|
</metadata>
|
||
|
<metadata tag="bugReady" timestamp="Fri, 30 Dec 2005 12:33:06 +0000">
|
||
|
koon
|
||
|
</metadata>
|
||
|
</glsa>
|