search menu icon-carat-right cmu-wordmark

CERT Coordination Center

star fails to set proper permissions on programs specified in RSH environment variable

Vulnerability Note VU#339089

Original Release Date: 2004-09-16 | Last Revised: 2004-09-17

Overview

Star can call external programs specified by the RSH environment variable. This may permit a malicious local user to gain elevated privileges.

Description

Star is a tape archiving program similar to tar. Star permits the use of storage devices on remote machines via an access program on the local machine. This access program is specified in the RSH environment variable. Star fails to drop the effective user ID (euid) when calling the program specified by the RSH environment variable.

Impact

By specifying a shell script of their own devising, malicious local users can execute arbitrary code with permissions of the star program. If star is suid root, the arbitrary code will run with root permissions.

Solution

This issue is resolved in star 1.5a46, available at the star download page.

In general, do not run programs as setuid root if such a permission level is not required.

Vendor Information

339089
 

View all 34 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Joerg Schilling for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2004-0850
Severity Metric: 4.28
Date Public: 2004-08-26
Date First Published: 2004-09-16
Date Last Updated: 2004-09-17 18:44 UTC
Document Revision: 7

Sponsored by CISA.