Package: dstat
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for dstat.

CVE-2009-3894[0]:
| dstat is looking for plugins in the current working directory which allows an 
| attack to place malicious plugin content into a directory the victim calls 
| dstat from (e.g. /tmp)

A CVE description is not yet public, so you might still see RESERVED on the 
mitre website. This exploit scenario is rather constructed in my opinion 
though there is the possibility to exploit people with that and it would be 
nice to get it fixed.

Patch by Robert Buchholz attached.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894
    http://security-tracker.debian.org/tracker/CVE-2009-3894

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
Index: dstat-0.6.9/dstat
===================================================================
--- dstat-0.6.9.orig/dstat
+++ dstat-0.6.9/dstat
@@ -28,8 +28,6 @@ try:
     inspath('/usr/local/share/dstat/')
     inspath('/usr/share/dstat/')
     inspath(os.path.abspath(os.path.dirname(sys.argv[0])) + '/plugins/')    # binary path + /plugins/
-    inspath(os.getcwd() + '/plugins/')                                      # current path + /plugins/
-    inspath(os.getcwd())                                                    # current path
     inspath(os.path.expanduser('~/.dstat/'))                                # home + /.dstat/
 except KeyboardInterrupt, e:
     pass

Attachment: pgpcwRtzHP8Uz.pgp
Description: PGP signature

Reply via email to