In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://launchpad.net/bugs/1677924 | vdb entry third party advisory |
https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html | vdb entry third party advisory |
http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/41923/ | exploit |
https://www.ubuntu.com/usn/usn-3255-1/ | third party advisory |
http://www.securityfocus.com/bid/97486 | vdb entry third party advisory |