Secunia Security Advisory - Red Hat has acknowledged a vulnerability in sblim, which can be exploited by malicious, local users to gain escalated privileges.
6d9f4c249ae4117aaec85afd4b6a19c4ca3488fd2ed8963fe7b9b3924c147e23
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
Red Hat sblim Insecure RPATH Privilege Escalation
SECUNIA ADVISORY ID:
SA30803
VERIFY ADVISORY:
http://secunia.com/advisories/30803/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
http://secunia.com/product/13651/
Red Hat Enterprise Linux Desktop (v. 5 client)
http://secunia.com/product/13653/
Red Hat Enterprise Linux (v. 5 server)
http://secunia.com/product/13652/
RedHat Enterprise Linux AS 4
http://secunia.com/product/4669/
RedHat Enterprise Linux ES 4
http://secunia.com/product/4668/
RedHat Enterprise Linux WS 4
http://secunia.com/product/4670/
DESCRIPTION:
Red Hat has acknowledged a vulnerability in sblim, which can be
exploited by malicious, local users to gain escalated privileges.
The vulnerability is caused due to an insecure RPATH being configured
within the sblim packages for Red Hat, which causes the affected
binaries to look for shared libraries within a world-writable
directory first. This can be exploited to execute arbitrary code with
privileges of the user running the affected binaries by causing the
binaries to load a malicious shared library.
SOLUTION:
Updated packages are available from Red Hat Network.
http://rhn.redhat.com
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
https://rhn.redhat.com/errata/RHSA-2008-0497.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------