Debian Security Advisory
DSA-079-2 uucp -- uucp uid/gid access
- Date Reported:
- 08 Feb 2002
- Affected Packages:
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 3312.
In Mitre's CVE dictionary: CVE-2001-0873.
- More information:
Zenith Parsec discovered a security hole in Taylor UUCP 1.06.1. It permits a local user to copy any file to anywhere which is writable by the uucp uid, which effectively means that a local user can completely subvert the UUCP subsystem, including stealing mail, etc.
If a remote user with UUCP access is able to create files on the local system, and can successfully make certain guesses about the local directory structure layout, then the remote user can also subvert the UUCP system. A default installation of UUCP will permit a remote user to create files on the local system if the UUCP public directory has been created with world write permissions.
Obviously this security hole is serious for anybody who uses UUCP on a multi-user system with untrusted users, or anybody who uses UUCP and permits connections from untrusted remote systems.
It was thought that this problem has been fixed with DSA 079-1, but that didn't fix all variations of the problem. The problem is fixed in version 1.06.1-11potato2 of uucp which uses a patch from the upstream author Ian Lance Taylor.
We recommend that you upgrade your uucp package immediately.
- Fixed in:
Debian GNU/Linux 2.2 (potato)
- Intel ia32:
- Motorola 680x0:
- Sun Sparc:
MD5 checksums of the listed files are available in the original advisory.