TrueCrypt execvp() PATH privilege escalation

truecrypt-execvp-gain-privileges (26191) The risk level is classified as MediumMedium Risk

Description:

TrueCrypt could allow a local attacker to gain elevated privileges caused by an error when processing path environments. When path environments are processed before the execvp() function is called, a local attacker could exploit this vulnerability to execute arbitrary commands with elevated privileges.


Consequences:

Gain Privileges

Remedy:

Upgrade to the latest version of TrueCrypt (4.2 or later), available from the TrueCrypt Web site. See References.

References:

  • Dailydave Mailing List, Sun Apr 30 07:10:57 EST 2006: Non disclosure from security vendors: Truecrypt exemple.
  • TrueCrypt Web site: TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/2000 and Linux.
  • CVE-2006-2183: Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command.
  • OSVDB ID: 25131: TrueCrypt External Command Path Subversion Local Privilege Escalation
  • SA19903: TrueCrypt External Command Execution Vulnerability

Platforms Affected:

  • Microsoft Windows Vista
  • TrueCrypt Foundation TrueCrypt 4.1

Reported:

Apr 30, 2006

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page