|
|
| |
|
| |
gnome-system-log: privilege escalation
| Package(s): | gnome-system-log |
CVE #(s): | CVE-2012-5535
|
| Created: | December 10, 2012 |
Updated: | December 12, 2012 |
| Description: |
From the Red Hat bugzilla:
gnome-system-log-3.6.0-1.fc18 is set up so that
$ gnome-system-log
executes "logview" as root through pkexec, only asking for the invoking user's password (because the org.gnome.logview.config.date.pkexec.run (sic) action has default policy auth_self_keep).
Running an X11 application as root in a session of a completely unprivileged user is risky enough in itself; however logview also allows (via the "wheel" button/Open) opening any file on the system, including /etc/shadow. This is at least a confidentiality violation; reading various authentication cookies or ssh private keys might even allow this to be amplified into a privilege escalation. |
| Alerts: |
|
( Log in to post comments)
|
|
|