Vulnerabilities > CVE-2006-0071 - Unspecified vulnerability in Gentoo App-Crypt Pinentry and Linux
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gentoo
nessus
Summary
The ebuild for pinentry before 0.7.2-r2 on Gentoo Linux sets setgid bits for pinentry programs, which allows local users to read or overwrite arbitrary files as gid 0.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200601-01.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200601-01 (pinentry: Local privilege escalation) Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0. Impact : A user of pinentry could potentially read and overwrite files with a group ID of 0. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20411 |
published | 2006-01-15 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20411 |
title | GLSA-200601-01 : pinentry: Local privilege escalation |
code |
|
References
- http://secunia.com/advisories/18284
- http://secunia.com/advisories/18284
- http://www.gentoo.org/security/en/glsa/glsa-200601-01.xml
- http://www.gentoo.org/security/en/glsa/glsa-200601-01.xml
- http://www.osvdb.org/22211
- http://www.osvdb.org/22211
- http://www.securityfocus.com/bid/16120
- http://www.securityfocus.com/bid/16120