Bug 1007186 (CVE-2013-4331) - CVE-2013-4331 lightdm: Word-readable .Xauthority
Summary: CVE-2013-4331 lightdm: Word-readable .Xauthority
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-4331
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1007187
Blocks: 1007189
TreeView+ depends on / blocked
 
Reported: 2013-09-12 05:21 UTC by Ratul Gupta
Modified: 2019-09-29 13:08 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-22 15:27:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Ratul Gupta 2013-09-12 05:21:33 UTC
It was found that lightdm prior to versions 1.4.3 and 1.6.2 created .Xauthority files in a user's home directory with world-readable permissions.  If a local user was able to access this file of another user, they could obtain the magic cookie it contained and connect to the X server as that user.  This would only be possible if the user's home directory did not have appropriate secure permissions (such as 0700).

Links to fixing commits:

1.4.x:
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.4/revision/1571
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.4/revision/1576
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.4/revision/1577

1.6.x:
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.6/revision/1641
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.6/revision/1652
http://bazaar.launchpad.net/~lightdm-team/lightdm/1.6/revision/1653

Bug Reports:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721744

Comment 1 Ratul Gupta 2013-09-12 05:26:54 UTC
Created lightdm tracking bugs for this issue:

Affects: fedora-all [bug 1007187]

Comment 2 Ratul Gupta 2013-09-12 06:06:18 UTC
This was assigned CVE-2013-4331: http://www.openwall.com/lists/oss-security/2013/09/11/8


Note You need to log in before you can comment on or make changes to this bug.