|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
libX11: descriptor leak
Synthesis of the vulnerability
A file descriptor is unnecessarily opened in libX11, but permits an attacker to access a file.
Impacted products: Mandriva Linux, XOrg Bundle ~ not comprehensive, libX11.
Severity of this bulletin: 2/4.
Consequences of an intrusion: data reading.
Hacker's origin: user shell.
Creation date: 02/11/2006.
Références of this threat: 8699, BID-20845, CVE-2006-5397, MDKSA-2006:199, VIGILANCE-VUL-6273.
Description of the vulnerability
The modules/im/ximcp/imLcIm.c file of libX11 manages input methods (generally used for Asian characters).
The XCOMPOSEFILE environment variable indicates the name of a file defining how to compose characters, by pressing several keys.
The file indicated by this variable is incorrectly opened twice in the XimCreateDefaultTree() function of imLcIm.c. The first file descriptor is never closed.
A local attacker can thus set XCOMPOSEFILE, then run a suid/sgid program linked with libX11 (such as xterm), in order to open the file, then to access its descriptor. The attacker can thus read its content.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability database. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.