Easy-to-exploit privilege escalation bug bites OpenBSD and other big name OSes

'Several big-name Linux and BSD operating systems are vulnerable to an exploit that gives untrusted users powerful root privileges. The critical flaw in the X.org server—the open-source implementation of the X11 system that helps manage graphics displays—affects OpenBSD, widely considered to be among the most secure OSes. It also impacts some versions of the Red Hat, Ubuntu, Debian, and CentOS distributions of Linux. An advisory X.org developers published Thursday disclosed the 23-month-old bug that, depending on how OS developers configure it, lets hackers or untrusted users elevate very limited system rights to unfettered root. The vulnerability, which is active when OSes run X.org in privileged (setuid) mode, allows files to be overwritten using the -logfile and -modulepath parameters. It also makes it trivial for low-privilege users to escalate system rights. A variety of nuances are leading to widely divergent assessments of the bug's severity. “Depending on whom you talk to, the reported severity will vary greatly,” Louis Dion-Marcil, a security researcher at GoSecure, told Ars. “I think most people will tell you it is very severe, and I would agree with them. The bug allows you to write arbitrary data to arbitrary files, which might seem trivial and not that dangerous, but it effectively allows regular, unprivileged users to elevate their privileges to the one of complete administrator of the system.”' -- source: https://arstechnica.com/information-technology/2018/10/x-org-bug-that-gives-... Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 858-5174 http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Mon, 29 Oct 2018 13:01:05 +1300, Peter Reutemann quoted:
'The vulnerability, which is active when OSes run X.org in privileged (setuid) mode ...'
One of the long-standing design flaws in the X11 server is its need to run with privileges. It’s surprising this kind of hole isn’t found more often; give credit to Keith “Mr X11” Packard and others who have done so much work over the years since the revival of the X.org consortium to clean up the code. You know the old joke about «insert name of open-source package here» being practically an operating system by itself? That was more true of the X server code than anything else you might have thought of.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann