Lucene search

K
archlinuxArchLinuxASA-201706-25
HistoryJun 22, 2017 - 12:00 a.m.

[ASA-201706-25] lxterminal: access restriction bypass

2017-06-2200:00:00
security.archlinux.org
5

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Arch Linux Security Advisory ASA-201706-25

Severity: Medium
Date : 2017-06-22
CVE-ID : CVE-2016-10369
Package : lxterminal
Type : access restriction bypass
Remote : No
Link : https://security.archlinux.org/AVG-264

Summary

The package lxterminal before version 0.3.0-2 is vulnerable to access
restriction bypass.

Resolution

Upgrade to 0.3.0-2.

pacman -Syu “lxterminal>=0.3.0-2”

The problem has been fixed upstream but no release is available yet.

Workaround

None.

Description

unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a
socket file, allowing a local user to cause a denial of service
(preventing terminal launch), or possibly have other impact (bypassing
terminal access control).

Impact

A local attacker might be able to cause a denial of service or bypass
the terminal access control to gain privileges or access sensitive
information.

References

https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commitdiff;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578
https://bugs.debian.org/862098
https://security.archlinux.org/CVE-2016-10369

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylxterminal< 0.3.0-2UNKNOWN

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%