LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: cdrecord privelege escalation vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Mandrake A vulnerability in cdrecord was discovered that can be used to obtain root access because Mandrake Linux ships with the cdrecord binary suid root and sgid cdwriter.

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           cdrecord
Advisory ID:            MDKSA-2003:058
Date:                   May 15th, 2003

Affected versions:	8.2, 9.0, 9.1, Corporate Server 2.1
________________________________________________________________________

Problem Description:

 A vulnerability in cdrecord was discovered that can be used to obtain
 root access because Mandrake Linux ships with the cdrecord binary
 suid root and sgid cdwriter.
 
 Updated packages are provided that fix this vulnerability.  You may
 also elect to remove the suid and sgid bits from cdrecord manually,
 which can be done by executing, as root:
 
   chmod ug-s /usr/bin/cdrecord
 
 This is not required to protect yourself from this particular
 vulnerability, however.
________________________________________________________________________

References:
  
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0289
   http://marc.theaimsgroup.com/?l=bugtraq&m=105285564307225&w=2
________________________________________________________________________

Updated Packages:
  
 Corporate Server 2.1:
 f9acb79ec47f9210fec2b237921b6538  corporate/2.1/RPMS/cdrecord-1.11-0.a32.2mdk.i586.rpm
 cadc1c431bcf9ff9a0cad7527f7d6133  corporate/2.1/RPMS/cdrecord-cdda2wav-1.11-0.a32.2mdk.i586.rpm
 b0e05c3c76e882456cb97cdde0c70477  corporate/2.1/RPMS/cdrecord-devel-1.11-0.a32.2mdk.i586.rpm
 30f363592408797a54e34b00325a5f46  corporate/2.1/RPMS/cdrecord-dvdhack-1.11-0.a32.2mdk.i586.rpm
 4804c96762ecb47f82eb6b86297d43d4  corporate/2.1/RPMS/mkisofs-1.15-0.a32.2mdk.i586.rpm
 59521b1b94cb3a3a7b893887557a7cbd  corporate/2.1/SRPMS/cdrecord-1.11-0.a32.2mdk.src.rpm

 Mandrake Linux 8.2:
 74684e91236d5d43bee1e734dc83a254  8.2/RPMS/cdrecord-1.11-0.a31.1.2mdk.i586.rpm
 78249bc93411b90a333db8a3522547b2  8.2/RPMS/cdrecord-cdda2wav-1.11-0.a31.1.2mdk.i586.rpm
 f1b109133a6ec537796f219c7cff4a26  8.2/RPMS/cdrecord-devel-1.11-0.a31.1.2mdk.i586.rpm
 8260d705d732d5fc5a2cd242c74ae34c  8.2/RPMS/cdrecord-dvdhack-1.11-0.a31.1.2mdk.i586.rpm
 4718ef8038632687a9d457a04860bcf5  8.2/RPMS/mkisofs-1.15-0.a31.1.2mdk.i586.rpm
 b27b3e85bc49ce32430a517e78c90839  8.2/SRPMS/cdrecord-1.11-0.a31.1.2mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 649fe380e3aeaaadd1a8c6e5e522ec4a  ppc/8.2/RPMS/cdrecord-1.11-0.a31.1.2mdk.ppc.rpm
 7ac1ddfaa771a76d84e3374f2a573e7e  ppc/8.2/RPMS/cdrecord-cdda2wav-1.11-0.a31.1.2mdk.ppc.rpm
 65c2ff6b701c6524cd433d897bd38035  ppc/8.2/RPMS/cdrecord-devel-1.11-0.a31.1.2mdk.ppc.rpm
 8ee3fe967c3bac949a096957097e26fd  ppc/8.2/RPMS/cdrecord-dvdhack-1.11-0.a31.1.2mdk.ppc.rpm
 ce823110d1e1bbc43ad1bf83819b22aa  ppc/8.2/RPMS/mkisofs-1.15-0.a31.1.2mdk.ppc.rpm
 16df8e5b09fe919fc838f5a30acb28d9  ppc/8.2/SRPMS/cdrecord-1.11-0.a31.1.1mdk.src.rpm
 b27b3e85bc49ce32430a517e78c90839  ppc/8.2/SRPMS/cdrecord-1.11-0.a31.1.2mdk.src.rpm

 Mandrake Linux 9.0:
 f9acb79ec47f9210fec2b237921b6538  9.0/RPMS/cdrecord-1.11-0.a32.2mdk.i586.rpm
 cadc1c431bcf9ff9a0cad7527f7d6133  9.0/RPMS/cdrecord-cdda2wav-1.11-0.a32.2mdk.i586.rpm
 b0e05c3c76e882456cb97cdde0c70477  9.0/RPMS/cdrecord-devel-1.11-0.a32.2mdk.i586.rpm
 30f363592408797a54e34b00325a5f46  9.0/RPMS/cdrecord-dvdhack-1.11-0.a32.2mdk.i586.rpm
 4804c96762ecb47f82eb6b86297d43d4  9.0/RPMS/mkisofs-1.15-0.a32.2mdk.i586.rpm
 59521b1b94cb3a3a7b893887557a7cbd  9.0/SRPMS/cdrecord-1.11-0.a32.2mdk.src.rpm

 Mandrake Linux 9.1:
 d7ebf3954e41ad0a7eede760b191525f  9.1/RPMS/cdrecord-2.0-2.1mdk.i586.rpm
 240e95f9818946a87032ac344e113da3  9.1/RPMS/cdrecord-cdda2wav-2.0-2.1mdk.i586.rpm
 ba5db2f8f00cb339ea2791806ccb6383  9.1/RPMS/cdrecord-devel-2.0-2.1mdk.i586.rpm
 fc6d6893df2f978a89670fe7e2b9b148  9.1/RPMS/cdrecord-dvdhack-2.0-2.1mdk.i586.rpm
 99d6e49d21fa3edd3290504339bdecb1  9.1/RPMS/mkisofs-2.0-2.1mdk.i586.rpm
 2c4381aa8545c5e382a25ef74a2f6dfb  9.1/SRPMS/cdrecord-2.0-2.1mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 f77c5b9c1243bf14103d4b4675b22fb6  ppc/9.1/RPMS/cdrecord-2.0-2.1mdk.ppc.rpm
 eafc927f0f5fa2bd72aee67173cfeafb  ppc/9.1/RPMS/cdrecord-cdda2wav-2.0-2.1mdk.ppc.rpm
 2415cc3bb4ac83d119a5774eb8a7f803  ppc/9.1/RPMS/cdrecord-devel-2.0-2.1mdk.ppc.rpm
 e7a1944b94be4ab0c4a916f5c8baa14a  ppc/9.1/RPMS/cdrecord-dvdhack-2.0-2.1mdk.ppc.rpm
 fc94a96533f1e8bb7a11f152697a3060  ppc/9.1/RPMS/mkisofs-2.0-2.1mdk.ppc.rpm
 2c4381aa8545c5e382a25ef74a2f6dfb  ppc/9.1/SRPMS/cdrecord-2.0-2.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

   http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

   http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

   http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  



 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System
Internet of things big security worry, says HP
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Insecure Connections: Enterprises hacked after neglecting third-party risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.