Bug#454167: priviledge escalation leading to root access when installed with suid 0

2007-12-04 Thread Nico Golde
Hi Moritz, * Moritz Muehlenhoff <[EMAIL PROTECTED]> [2007-12-04 22:30]: > severity 454167 important > thanks > > Nico Golde wrote: > > Package: sing > > Version: 1.1-15 > > Severity: critical > > Tags: security > > > > Please have a look at: > > http://www.securityfocus.com/archive/1/484472 > >

Bug#454167: priviledge escalation leading to root access when installed with suid 0

2007-12-04 Thread Moritz Muehlenhoff
severity 454167 important thanks Nico Golde wrote: > Package: sing > Version: 1.1-15 > Severity: critical > Tags: security > > Hi, > Please have a look at: > http://www.securityfocus.com/archive/1/484472 The assertion by the security researcher above is incorrect, both the packages in Sarge and

Bug#454167: priviledge escalation leading to root access when installed with suid 0

2007-12-04 Thread Nico Golde
Hi, Name: CVE-2007-6211 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6211 Reference: BUGTRAQ:20071203 sing (debian) vunlerability? Reference: URL:http://www.securityfocus.com/archive/1/archive/1/484472/100/0/threaded Reference: BID:26679 Reference: URL:http://www.s

Bug#454167: priviledge escalation leading to root access when installed with suid 0

2007-12-03 Thread Nico Golde
Package: sing Version: 1.1-15 Severity: critical Tags: security Hi, Please have a look at: http://www.securityfocus.com/archive/1/484472 This is really a critical thing if sing was installed with suid 0 it allows every user on the system to get root access and/or to overwrite arbitrary files. P