Public bug reported: Binary package hint: mistelix
>From http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598297: Package: mistelix Version: 0.31-1 Severity: grave Tags: security User: t...@security.debian.org Usertags: ldpath Hello, During a review of the Debian archive, I've found your package to contain a script that can be abused by an attacker to execute arbitrary code. The vulnerability is introduced by an insecure change to LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for libraries on a directory other than the standard paths. Vulnerable code follows: /usr/bin/mistelix line 8: export LD_LIBRARY_PATH=$libdir/mistelix/:$LD_LIBRARY_PATH When there's an empty item on the colon-separated list of LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.) If the given script is executed from a directory where a potential, local, attacker can write files to, there's a chance to exploit this bug. This vulnerability has been assigned the CVE id CVE-2010-3365. Please make sure you mention it when forwarding this report to upstream and when fixing this bug (everywhere: upstream and here at Debian.) [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3365 [1] http://security-tracker.debian.org/tracker/CVE-2010-3365 Sincerely, Raphael Geissert ** Affects: mistelix (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: mistelix (Ubuntu Lucid) Importance: Undecided Status: New ** Affects: mistelix (Ubuntu Karmic) Importance: Undecided Status: New ** Changed in: mistelix (Ubuntu) Status: New => Triaged ** Also affects: mistelix (Ubuntu Karmic) Importance: Undecided Status: New ** Also affects: mistelix (Ubuntu Lucid) Importance: Undecided Status: New -- CVE-2010-3365: insecure library loading https://bugs.launchpad.net/bugs/651054 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs