|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200701-17] libgtop: Privilege escalation Vulnerability Scan
Vulnerability Scan Summary libgtop: Privilege escalation
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200701-17
(libgtop: Privilege escalation)
Liu Qishuai discovered that glibtop_get_proc_map_s() in
sysdeps/linux/procmap.c does not properly allocate memory for storing a
filename, allowing certain filenames to cause the buffer to overflow on
the stack.
Impact
By tricking a victim into executing an application that uses the
libgtop library (e.g. libgtop_daemon or gnome-system-monitor), a local
attacker could specify a specially crafted filename to be used by
libgtop causing a buffer overflow and possibly execute arbitrary code
with the rights of the user running the application.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235
Solution:
All libgtop users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=gnome-base/libgtop-2.14.6"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|