Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <538DCF76.50002@upv.es>
Date: Tue, 03 Jun 2014 15:36:54 +0200
From: Hector Marco <hecmargi@....es>
To: oss-security@...ts.openwall.com
Subject: CVE-2014-1226 s3dvt Root shell (still)

CVE-2014-1226 s3dvt Root shell (still)


About s3dvt:

s3dvt is part of the 3d network display server which can be used as
3d desktop environment.



Vulnerability:

The s3dvt developers forgot to review all the code. There is still a
vulnerable function as in the previous CVE-2013-6825. At the date of
Jun 1, 2014 the last commit of the s3dvt is still vulnerable and
exploitable. Commit: 1e9c9c53fa192cbf4f79d724b5e6c76374516968


Details, patches, discussion and strategy to exploit at:
http://hmarco.org/bugs/CVE-2014-1226-s3dvt_0.2.2-root-shell.html


Because we found a bug in bash <= 4.3 this vulnerability can be
successfully exploited. Bash bug details at:
http://hmarco.org/bugs/bash_4.3-setuid-bug.html



Hector Marco
http://hmarco.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.