libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2011/07/21/3 | mailing list |
https://bugzilla.novell.com/show_bug.cgi?id=694598 | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html | vendor advisory |
http://secunia.com/advisories/45075 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/48490 | vdb entry |
http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz | patch |
http://www.openwall.com/lists/oss-security/2011/07/22/4 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/08/12/10 | mailing list |
http://secunia.com/advisories/50785 | third party advisory |
http://secunia.com/advisories/50973 | third party advisory |
http://lwn.net/Alerts/449415/ | vendor advisory |