search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Linux dump uses environment variables insecurely, allowing for root compromise

Vulnerability Note VU#153653

Original Release Date: 2001-08-21 | Last Revised: 2001-08-21

Overview

Some implementations of the Linux backup utility, dump, call external programs on remote machines via the RSH environment variable. This may permit an attacker to compromise root if dump is setuid root.

Description

Some implementations of the Linux backup utility, dump, permit use of backup devices on remote machines via an access program on the local machine. This access program is identified in the RSH environment variable. The value in the environment variable is not validated for security prior to its use in calling a program. In some implementations, dump is protected setuid root.

Impact

By specifying a shell script of their own devising, malicious local users can exploit the setuid protection on dump to secure root access for themselves to execute arbitrary commands.

Solution

Apply vendor patches; see the Systems Affected section below.

Remove suid protection from dump.

Vendor Information

153653
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was first reported throught discussion on Bugtraq

This document was last modified by Tim Shimeall.

Other Information

CVE IDs: CVE-2000-1009
Severity Metric: 18.88
Date Public: 2000-10-31
Date First Published: 2001-08-21
Date Last Updated: 2001-08-21 13:07 UTC
Document Revision: 10

Sponsored by CISA.