libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2012-1284.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/09/12/6 | mailing list |
http://www.spinics.net/lists/spice-devel/msg01940.html | exploit mailing list |
http://www.openwall.com/lists/oss-security/2012/09/17/2 | mailing list |
http://permalink.gmane.org/gmane.linux.redhat.fedora.extras.cvs/853051 | patch mailing list |
http://www.exploit-db.com/exploits/21323 | exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=857283 | |
http://www.openwall.com/lists/oss-security/2012/09/14/2 | mailing list |
http://www.securityfocus.com/bid/55555 | vdb entry |