Package: core-network
Version: 4.8-1
Severity: critical
Tags: security
Justification: root security hole

This bug was found and reported by asaladin on OFTC #debian. As he has
yet to report a bug, I'm reporting it for him.

Steps to reproduce:
1. Start core-gui as a normal user.
2. Create a host from the toolbar on the left.
3. Start the session using the green button on the toolbar.
4. Double-click on the host

Now you get a root shell. I've tested it by adding a line to /etc/passwd
and by creating a file in /root/.

The bug is most probably in core-network-daemon, as that is the only
part that runs as root. The bug should be exploitable without using the
GUI, but I do not know enough about core-network to try to reproduce it
using the command-line tools.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.1.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages core-network depends on:
ii  core-network-daemon  4.8-1
ii  core-network-gui     4.8-1

core-network recommends no packages.

Versions of packages core-network suggests:
ii  tcpdump  4.7.4-1

-- no debconf information
-- 
Marius Gavrilescu

Attachment: signature.asc
Description: PGP signature

Reply via email to