Package: tss
Version: 0.8.1-3
Severity: grave
Justification: user security hole
Tags: security

*** Please type your report below this line ***

  Due to poor permission checking the tss binary allows local
 users to read arbitrary files upon the system.

  For example the following reveals the contents of the
 /etc/shadow file:

    [EMAIL PROTECTED]:~$ tss -a /etc/shadow

  The code *should* drop privileges prior to opening
 any files, or failing that should stat() the file to ensure
 the caller may view it.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-4-xen-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages tss depends on:
ii  libc6                     2.7-10         GNU C Library: Shared libraries
ii  libncurses5               5.6+20080405-1 Shared libraries for terminal hand

tss recommends no packages.

-- no debconf information

Steve
-- 
Managed Anti-Spam Service
http://mail-scanning.com/




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to