Vulnerabilities > CVE-2011-2921 - Improper Check for Dropped Privileges vulnerability in Ktsuss Project Ktsuss 1.3/1.4
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
Exploit-Db
id | EDB-ID:47344 |
last seen | 2019-09-03 |
modified | 2019-09-03 |
published | 2019-09-03 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/47344 |
title | ktsuss 1.4 - suid Privilege Escalation (Metasploit) |
Metasploit
description | This module attempts to gain root privileges by exploiting a vulnerability in ktsuss versions 1.4 and prior. The ktsuss executable is setuid root and does not drop privileges prior to executing user specified commands, resulting in command execution with root privileges. This module has been tested successfully on: ktsuss 1.3 on SparkyLinux 6 (2019.08) (LXQT) (x64); and ktsuss 1.3 on SparkyLinux 5.8 (LXQT) (x64). |
id | MSF:EXPLOIT/LINUX/LOCAL/KTSUSS_SUID_PRIV_ESC |
last seen | 2020-02-11 |
modified | 2019-11-03 |
published | 2019-08-19 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/local/ktsuss_suid_priv_esc.rb |
title | ktsuss suid Privilege Escalation |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-201201-15.NASL |
description | The remote host is affected by the vulnerability described in GLSA-201201-15 (ktsuss: Privilege escalation) Two vulnerabilities have been found in ktuss: Under specific circumstances, ktsuss skips authentication and fails to change the effective UID back to the real UID (CVE-2011-2921). The GTK interface spawned by the ktsuss binary is run as root (CVE-2011-2922). Impact : A local attacker could gain escalated privileges and use the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 57721 |
published | 2012-01-30 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/57721 |
title | GLSA-201201-15 : ktsuss: Privilege escalation |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/154307/ktsuss_suid_priv_esc.rb.txt |
id | PACKETSTORM:154307 |
last seen | 2019-09-02 |
published | 2019-09-02 |
reporter | Brendan Coles |
source | https://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html |
title | ktsuss Suid Privilege Escalation |
References
- http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html
- https://access.redhat.com/security/cve/cve-2011-2921
- https://security-tracker.debian.org/tracker/CVE-2011-2921
- http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html
- https://security-tracker.debian.org/tracker/CVE-2011-2921
- https://access.redhat.com/security/cve/cve-2011-2921