A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://secunia.com/advisories/38794 | third party advisory |
http://lists.vmware.com/pipermail/security-announce/2010/000082.html | mailing list |
http://www.securityfocus.com/bid/36552 | vdb entry |
https://rhn.redhat.com/errata/RHSA-2009-1470.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038214.html | vendor advisory |
http://secunia.com/advisories/38834 | third party advisory |
http://osvdb.org/58495 | vdb entry |
http://secunia.com/advisories/39182 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9862 | signature vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=522141 | |
http://www.vupen.com/english/advisories/2010/0528 | vdb entry |