News Categories
News Items
Security News, Business News - Apr 15, 2018
Title: Gentoo net-im/jabberd2 privilege escalation via PID file manipulationAuthor: Michael OrlitzkyFixedin: commit b50a3068SummaryThe Gentoo net-im/jabberd2 package gives ownership of its PID file directory to the daemon's runtime user. That can be exploited by the runtime user to kill root process...
Security News, Business News - Apr 15, 2018
Title: Gentoo app-admin/collectd privilege escalation via PID file manipulationAuthor: Michael OrlitzkyFixedin: commit 9a70b58, version 5.7.2-r1SummaryNote: the app-admin/collectd package has been renamed to app-metrics/collectd.Learn MoreComplete details here: http://michael.orlitzky.com/cves/cve-2...
Security News, Business News - Apr 15, 2018
Title: Gentoo net-im/jabberd2 root privilege escalation via user-owned executablesAuthor: Michael OrlitzkyFixedin: commit b50a3068SummaryAll versions of the Gentoo net-im/jabberd2 package allow the local unprivileged jabber user to gain root by modifying the /usr/bin/{jabberd,router,sm,c2s,s2s} exec...
Security News, Business News - Apr 15, 2018
Title: Icinga2 privilege escalation via PID file manipulationAuthor: Michael OrlitzkyFixedin: commit c6b8668 , version 2.8.2SummaryThe icinga2 daemon creates its PID file after dropping privileges to a non-root user. That may be exploited by the unprivileged user to kill root processes, since when t...
Security News, Business News - Feb 14, 2018
Title: opentmpfiles root privilege escalation via recursive chownAuthor: Michael OrlitzkyFixedin:SummaryThe opentmpfiles program implements the tmpfiles.d specification for POSIX systems that do not run systemd. When processing a Z type entry, opentmpfiles calls chown recursively to change ownership...
Security News, Business News - Jan 29, 2018
Title: systemd-tmpfiles root privilege escalation sans fs.protected_hardlinksAuthor: Michael OrlitzkyFixedin: commit 5579f85 , version 237SummaryBefore version 237, the systemd-tmpfiles program will change the permissions and ownership of hard links. If the administrator disables the fs.protected_ha...
Security News, Business News - Jan 04, 2018
Title: GNU chown and chgrp privilege escalation via recursive dereferencesAuthor: Michael OrlitzkyFixedin:SummaryThe chown program in GNU coreutils is vulnerable to a race condition when using the POSIX -R -L options to follow symlinks recursively. In the presence of symlinks, the recursive director...
Security News, Business News - Nov 23, 2017
Title: Icinga2 root privilege escalation via init script and systemd serviceAuthor: Michael OrlitzkyFixedin:SummaryThe icinga2 init script (etc/initsystem/icinga2.init.d.cmake) and systemd service file (etc/initsystem/icinga2.service.cmake) allow the unprivileged $ICINGA2_USER to gain root privilege...
Security News, Business News - Nov 18, 2017
Title: Icinga core root privilege escalation via insecure permissionsAuthor: Michael OrlitzkyFixedin: commits ad2eb58 and 161c621, version 1.14.2SummaryIcinga installs two sets of files with insecure permissions: after installation, the executables and the configuration files are all owned by the sa...
Security News, Business News - Nov 15, 2017
Title: pnp4nagios root privilege escalation via insecure permissionsAuthor: Michael OrlitzkyFixedin: Commit 23c123fSummaryThe pnp4nagios build system installs two sets of files with insecure permissions. After installation, the executables and the configuration files are all owned by the same unpriv...