Bug 11633 - KDE kscd SHELL Environmental Variable Vulnerability
KDE kscd SHELL Environmental Variable Vulnerability
Status: CLOSED WORKSFORME
Product: Red Hat Linux
Classification: Retired
Component: kdemultimedia (Show other bugs)
6.2
All Linux
medium Severity medium
: ---
: ---
Assigned To: Bernhard Rosenkraenzer
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2000-05-24 11:35 EDT by Matthew Miller
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-05-24 11:35:41 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Matthew Miller 2000-05-24 11:35:41 EDT
From bugtraq. http://www.securityfocus.com/vdb/bottom.html?vid=1206

kscd is a CD player for the KDE desktop, a popular window manager for X11,
and is part of the KDE multimedia package. This application is installed
setuid 'disk'. kscd blindly uses the  contents of the 'SHELL' variable to
execute a browser. As such, it is possible to alter the contents of the
SHELL variable to execute something other than the shell. As such, it is
possible to use kscd to obtain a setuid disk shell. Using these privileges,
along with code provided in the exploit, it is possible to change
attributes on raw disks. This in turn allows an attacker to create a root
shell, thus compromising the integrity of the machine.
Comment 1 Bernhard Rosenkraenzer 2000-06-23 07:38:57 EDT
Since we aren't shipping kscd setuid or setgid anything, this bug can not be
exploited on Red Hat Linux, all you can do is have kscd exec a different program
as itself.

Note You need to log in before you can comment on or make changes to this bug.