ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html | third party advisory vdb entry exploit |
https://security-tracker.debian.org/tracker/CVE-2011-2921 | third party advisory |
https://access.redhat.com/security/cve/cve-2011-2921 | third party advisory broken link |