Lucene search

K
gentooGentoo FoundationGLSA-201201-15
HistoryJan 27, 2012 - 12:00 a.m.

ktsuss: Privilege escalation

2012-01-2700:00:00
Gentoo Foundation
security.gentoo.org
16

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.261 Low

EPSS

Percentile

96.8%

Background

ktsuss is a simple, graphical version of su written in C and GTK+.

Description

Two vulnerabilities have been found in ktuss:

  • Under specific circumstances, ktsuss skips authentication and fails to change the effective UID back to the real UID (CVE-2011-2921).
  • The GTK interface spawned by the ktsuss binary is run as root (CVE-2011-2922).

Impact

A local attacker could gain escalated privileges and use the “GTK_MODULES” environment variable to possibly execute arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

Gentoo discontinued support for ktsuss. We recommend that users unmerge ktsuss:

 # emerge --unmerge "x11-misc/ktsuss"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-misc/ktsuss<= 1.4UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.261 Low

EPSS

Percentile

96.8%