Package: tss Version: 0.8.1-3 Severity: grave Justification: user security hole Tags: security
*** Please type your report below this line *** Due to poor permission checking the tss binary allows local users to read arbitrary files upon the system. For example the following reveals the contents of the /etc/shadow file: [EMAIL PROTECTED]:~$ tss -a /etc/shadow The code *should* drop privileges prior to opening any files, or failing that should stat() the file to ensure the caller may view it. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.18-4-xen-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages tss depends on: ii libc6 2.7-10 GNU C Library: Shared libraries ii libncurses5 5.6+20080405-1 Shared libraries for terminal hand tss recommends no packages. -- no debconf information Steve -- Managed Anti-Spam Service http://mail-scanning.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]