summaryrefslogtreecommitdiff
path: root/advisories/teso-advisory-012.txt
blob: 8056b3b713455df2ee4e5f84f12859e9b5b0e476 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84


TESO Security Advisory
01/01/2002

LIDS Linux Intrusion Detection System vulnerability


Summary
===================

    The "Linux Intrusion Detection System" security patches create a security
    vulnerability. Exploitation is easy and local users may be able to gain
    unrestricted root priviledges.


Systems Affected
===================

    Almost any Linux system that uses the LIDS kernel patches.


Impact
===================

    Through crafting a LD_PRELOAD library that runs without capability
    restrictions and executing an unrestricted binary an attacker is able
    to inherit the restrictions of the executed binary. On most systems
    where the necessary binaries are provided, he can get rid of all his
    restrictions.


Explanation
===================



Solution
===================

    The vendors have been notified of the problem at the same time as the
    general public, vendor patches that fix the bug should be available soon.



Acknowledgements
===================

    The bug has been discovered by stealth.

    The tests and further analysis were done by stealth.


Contact Information
===================

    The TESO crew can be reached by mailing to teso@team-teso.net
    Our web page is at http://www.team-teso.net/


References
===================

    [1] TESO
        http://www.team-teso.net/


Disclaimer
===================

    This advisory does not claim to be complete or to be usable for any
    purpose. Especially information on the vulnerable systems may be inaccurate
    or wrong. Possibly supplied exploit code is not to be used for malicious
    purposes, but for educational purposes only.

    This advisory is free for open distribution in unmodified form.
    Articles that are based on information from this advisory should include
    link [1].


Exploit
===================