Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 424025 (CVE-2012-3366) - <app-admin/bcfg2-1.2.2-r1 Trigger plugin remote client privilege escalation (CVE-2012-3366)
Summary: <app-admin/bcfg2-1.2.2-r1 Trigger plugin remote client privilege escalation (...
Status: RESOLVED FIXED
Alias: CVE-2012-3366
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://trac.mcs.anl.gov/projects/bcfg...
Whiteboard: ~0 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-06-29 06:27 UTC by Michael Weber (RETIRED)
Modified: 2012-07-10 23:58 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Weber (RETIRED) gentoo-dev 2012-06-29 06:27:36 UTC
As seen on http://www.debian.org/security/2012/dsa-2503

Quoting the upstream announcement (written by Chris St. Pierre):

"We have found a major security flaw in the Trigger plugin that would allow a
malicious user who has root access to a Bcfg2 client to run arbitrary commands
on the server as the user the bcfg2-server process is running as by passing a
malformed UUID.

This is very similar to a flaw discovered last year in a large number of other
plugins; this instance was not fixed at that time because Trigger uses a
different method to invoke external shell commands, and because Trigger
previously hid all errors from trigger scripts, so tests did not find the
issue.  As a side effect of this change, Trigger will begin reporting errors
from triggered scripts.

This only affects the Trigger plugin; if you are not using Trigger, you are
not affected by this flaw.  As a workaround, you can disable Trigger until you
are able to upgrade."


The corresponding changeset [1] will be included in app-admin/bcfg2-1.2.2-r1.
Comment 1 Michael Weber (RETIRED) gentoo-dev 2012-06-29 06:29:31 UTC
+*bcfg2-1.2.2-r1 (29 Jun 2012)
+
+  29 Jun 2012; Michael Weber <xmw@gentoo.org> +bcfg2-1.2.2-r1.ebuild,
+  +files/bcfg2-1.2.2-CVE-2012-3366-Trigger-plugin.patch:
+  Revbump to fix trigger plugin security problem (bug 424025)
+
Comment 2 Michael Weber (RETIRED) gentoo-dev 2012-06-29 06:34:42 UTC
+  29 Jun 2012; Michael Weber <xmw@gentoo.org> package.mask:
+  Mask <app-admin/bcfg2-1.2.2-r1 for security, bug 424025)
+
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2012-07-10 23:56:27 UTC
CVE-2012-3366 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3366):
  The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with
  root access to the client to execute arbitrary commands via shell
  metacharacters in the UUID field to the server process (bcfg2-server).
Comment 4 Sean Amoss (RETIRED) gentoo-dev Security 2012-07-10 23:58:53 UTC
Thanks, everyone. 

Closing noglsa for ~arch only