FreeBSD bmon Port Relative Path Subversion Privilege Escalation

2004-05-29T00:00:00
ID OSVDB:11189
Type osvdb
Reporter Jon Nistor(nistor@snickers.org)
Modified 2004-05-29T00:00:00

Description

Vulnerability Description

A bandwidth monitor, bmon, on FreeBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the FreeBSD port system installs bmon with setuid superuser privileges.

Technical Description

This only affects the FreeBSD port. The original package distributed by the software author does not install with SUID privileges.

Solution Description

Upgrade to version 1.2.1_2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

A bandwidth monitor, bmon, on FreeBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the FreeBSD port system installs bmon with setuid superuser privileges.

References:

Vendor URL: http://trash.net/~reeler/bmon/ Vendor URL: http://people.suug.ch/~tgr/bmon/ Vendor Specific News/Changelog Entry: http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/67340 Vendor Specific News/Changelog Entry: http://people.freebsd.org/~eik/portaudit/938f357c-16dd-11d9-bc4a-000c41e2cdad.html Security Tracker: 1011655 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0579.html ISS X-Force ID: 17827 Generic Exploit URL: http://www.securityfocus.com/data/vulnerabilities/exploits/bmon.sh Bugtraq ID: 11457