Lucene search

K
gentooGentoo FoundationGLSA-200502-31
HistoryFeb 28, 2005 - 12:00 a.m.

uim: Privilege escalation vulnerability

2005-02-2800:00:00
Gentoo Foundation
security.gentoo.org
7

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

5.1%

Background

uim is a simple, secure and flexible input method library.

Description

Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. This vulnerability only affects immodule-enabled Qt (if you build Qt 3.3.2 or later versions with USE=“immqt” or USE=“immqt-bc”).

Impact

A malicious local user could exploit this vulnerability to execute arbitrary code with escalated privileges.

Workaround

There is no known workaround at this time.

Resolution

All uim users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-i18n/uim< 0.4.5.1UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

5.1%