Linux-VServer allows elevated privileges

linux-vserver-gain-privileges (15073) The risk level is classified as HighHigh Risk

Description:

Linux-VServer could allow a local attacker to gain elevated privileges on the system. The chmod function fails to properly apply the chmod 000 restriction for VServer directories. A local attacker, with root privileges, could exploit this vulnerability to escape a chrooted VServer and gain unauthorized access to the vulnerable system.


Consequences:

Gain Privileges

Remedy:

Upgrade to the latest version of Linux-VServer (1.26 or later), available from the Linux-VServer Web site. See References.

References:

  • BugTraq Mailing List, Fri Feb 06 2004 - 01:58:01 CST: Linux 2.4.24 with vserver 1.24 exploit.
  • Linux-VServer ChangeLog Web page: vs1.25 [2004.02.06].
  • Linux-VServer Web site: Linux-VServer.
  • BID-9596: Linux VServer Project CHRoot Breakout Vulnerability
  • CVE-2003-1288: Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions.
  • CVE-2004-2073: Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command.
  • OSVDB ID: 3875: Linux VServer Chroot Escape
  • OSVDB ID: 7587: VServer Unspecified SMP Race Condition
  • SA10816: Linux VServer Chroot Escape Vulnerability

Platforms Affected:

  • VServer Linux-VServer prior to 1.25

Reported:

Feb 06, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page