summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs/11-maildrop.adv
blob: e5f203d17adac4f749a68906c9b3c78853b345ee (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
source: maildrop
date: August 29th, 2005
author: Andres Salomon
vuln-type: local privilege escalation
problem-scope: local
debian-specific: yes
cve: CVE-2005-2655
testing-fix: 1.5.3-1.1etch1
sid-fix: 1.5.3-2
upgrade: apt-get install maildrop

The lockmail binary shipped with maildrop allows for an attacker to
obtain an effective gid as group "mail".  Debian ships the binary with its
setgid bit set, but the program does not drop privileges when run.  It takes
an argument that is executed, and since it does not drop privileges, an
attacker can execute an arbitrary command with an effective gid of the "mail"
group.

© 2014-2024 Faster IT GmbH | imprint | privacy policy