Hi all,

I have been noticed about a root exploit in X2Go Server code. This vulnerability has been (hopefully) fixed in X2Go Server 4.0.1.10 (and in the LTS release branch 4.0.0.8).

This issue has now been a CVE ID to. Please see below.

All distributors of X2Go Server, please provide package upgrades to your distribution.

Thanks+Greets,
Mike

----- Weitergeleitete Nachricht von cve-ass...@mitre.org -----
  Datum: Sat, 4 Jan 2014 11:23:29 -0500 (EST)
    Von: cve-ass...@mitre.org
Betreff: Re: root exploit in X2Go Server
     An: mike.gabr...@das-netzwerkteam.de
     Cc: cve-ass...@mitre.org

this is to request or a CVE-ID. We have been reported and we have
fixed a root exploit in X2Go Server.

In versions of X2Go Server previous to 4.0.0.8 (LTS release branch)
and previous to 4.0.1.10 (main release branch) a normal user could
gain root access to X2Go Server machines.

The vulnerability has been fixed by these commits

http://code.x2go.org/gitweb?p=x2goserver.git;a=commitdiff;h=c2036a1152a7e57286ffeb8e8859177f8de64a33
http://code.x2go.org/gitweb?p=x2goserver.git;a=commitdiff;h=80ff6997550749a64dd5db5684acbd47a4127ab3

Use CVE-2013-7261 for this issue involving root access through the use
of shell metacharacters.

- --
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

----- Ende der weitergeleiteten Nachricht -----

--

DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148

GnuPG Key ID 0x25771B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de

freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb

Attachment: pgp0487JL7Ke3.pgp
Description: Digitale PGP-Signatur

_______________________________________________
X2Go-Dev mailing list
X2Go-Dev@lists.berlios.de
https://lists.berlios.de/mailman/listinfo/x2go-dev

Reply via email to