Your message dated Sat, 12 Apr 2008 19:23:05 +0200
with message-id <[EMAIL PROTECTED]>
has caused the report #475747,
regarding tss: Allows reading arbitary files
to be marked as having been forwarded to the upstream software
author(s) Kristian Gunstone <[EMAIL PROTECTED]>
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
475747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475747
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
On Sat, Apr 12, 2008 at 06:12:21PM +0100, Steve Kemp wrote:
> Package: tss
> Version: 0.8.1-3
> Severity: grave
> Justification: user security hole
> Tags: security
>
> Due to poor permission checking the tss binary allows local
> users to read arbitrary files upon the system.
>
> For example the following reveals the contents of the
> /etc/shadow file:
>
> [EMAIL PROTECTED]:~$ tss -a /etc/shadow
>
> The code *should* drop privileges prior to opening
> any files, or failing that should stat() the file to ensure
> the caller may view it.
---end quoted text---
--
أحمد المحمودي (Ahmed El-Mahmoudy)
Digital design engineer
SySDSoft, Inc.
GPG KeyID: 0x9DCA0B27 (@ subkeys.pgp.net)
GPG Fingerprint: 087D 3767 8CAC 65B1 8F6C 156E D325 C3C8 9DCA 0B27
--- End Message ---