Lucene search

K
gentooGentoo FoundationGLSA-200911-04
HistoryNov 25, 2009 - 12:00 a.m.

dstat: Untrusted search path

2009-11-2500:00:00
Gentoo Foundation
security.gentoo.org
11

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.6%

Background

dstat is a versatile system resource monitor written in Python.

Description

Robert Buchholz of the Gentoo Security Team reported that dstat includes the current working directory and subdirectories in the Python module search path (sys.path) before calling β€œimport”.

Impact

A local attacker could entice a user to run β€œdstat” from a directory containing a specially crafted Python module, resulting in the execution of arbitrary code with the privileges of the user running the application.

Workaround

Do not run β€œdstat” from untrusted working directories.

Resolution

All dstat users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/dstat-0.6.9-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/dstat<Β 0.6.9-r1UNKNOWN

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.6%