Lucene search

K
gentooGentoo FoundationGLSA-200701-17
HistoryJan 23, 2007 - 12:00 a.m.

libgtop: Privilege escalation

2007-01-2300:00:00
Gentoo Foundation
security.gentoo.org
17

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

19.4%

Background

libgtop facilitates the libgtop_daemon, which is used by GNOME to obtain information about remote systems.

Description

Liu Qishuai discovered that glibtop_get_proc_map_s() in sysdeps/linux/procmap.c does not properly allocate memory for storing a filename, allowing certain filenames to cause the buffer to overflow on the stack.

Impact

By tricking a victim into executing an application that uses the libgtop library (e.g. libgtop_daemon or gnome-system-monitor), a local attacker could specify a specially crafted filename to be used by libgtop causing a buffer overflow and possibly execute arbitrary code with the rights of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All libgtop users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=gnome-base/libgtop-2.14.6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallgnome-base/libgtop< 2.14.6UNKNOWN

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

19.4%