GTK+ 任意可受载模型执行漏洞

漏洞信息详情

GTK+ 任意可受载模型执行漏洞

漏洞简介

GTK+库存在漏洞。本地用户借助GTK_MODULES环境变量说明任意模型,本地用户在GTK+被setuid/setgid程序使用时提升特权。

漏洞公告

A temporary fix is to add the following line of code to line 215 (approximately in GTK 1.2.8 ) of source file gtkmain. The line should read as follows:
env_string = getenv (“GTK_MODULES”);
The following line should be added above it:
if(geteuid() == getuid())

参考网址

来源: BID
名称: 2165
链接:http://www.securityfocus.com/bid/2165

来源: www.gtk.org
链接:http://www.gtk.org/setuid.html

来源: BUGTRAQ
名称: 20010103 Claimed vulnerability in GTK_MODULES
链接:http://archives.neohapsis.com/archives/bugtraq/2001-01/0027.html

来源: BUGTRAQ
名称: 20010102 gtk+ security hole.
链接:http://archives.neohapsis.com/archives/bugtraq/2000-12/0498.html

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享