CVE-2014-1226 - s3dvt - root shell

Hector Marco Gisbert, Ismael Ripoll

Research output: Other contribution

Abstract

The s3dvt developers forgot to review all the code. There is still a vulnerable function as in the previous CVE-2013-6876 - s3dvt_0.2.2 root shell vulnerability.

The bug as previous one is caused by not checking the return values of setuid() and getuid() calls. The process must not continue its normal execution when any of these calls fail (return an error) to drop privileges.
Original languageEnglish
TypeCVE-2014-1226
Publisherhttp://hmarco.org
Publication statusPublished - 25 Mar 2014

Cite this

Marco Gisbert, H., & Ripoll, I. (2014, Mar 25). CVE-2014-1226 - s3dvt - root shell. http://hmarco.org.
Marco Gisbert, Hector ; Ripoll, Ismael. / CVE-2014-1226 - s3dvt - root shell. 2014. http://hmarco.org.
@misc{a0a0cb0eee9646aa9a15820054eab42a,
title = "CVE-2014-1226 - s3dvt - root shell",
abstract = "The s3dvt developers forgot to review all the code. There is still a vulnerable function as in the previous CVE-2013-6876 - s3dvt_0.2.2 root shell vulnerability.The bug as previous one is caused by not checking the return values of setuid() and getuid() calls. The process must not continue its normal execution when any of these calls fail (return an error) to drop privileges.",
author = "{Marco Gisbert}, Hector and Ismael Ripoll",
year = "2014",
month = "3",
day = "25",
language = "English",
publisher = "http://hmarco.org",
address = "United Kingdom",
type = "Other",

}

Marco Gisbert, H & Ripoll, I 2014, CVE-2014-1226 - s3dvt - root shell. http://hmarco.org.

CVE-2014-1226 - s3dvt - root shell. / Marco Gisbert, Hector; Ripoll, Ismael.

http://hmarco.org. 2014, CVE-2014-1226.

Research output: Other contribution

TY - GEN

T1 - CVE-2014-1226 - s3dvt - root shell

AU - Marco Gisbert, Hector

AU - Ripoll, Ismael

PY - 2014/3/25

Y1 - 2014/3/25

N2 - The s3dvt developers forgot to review all the code. There is still a vulnerable function as in the previous CVE-2013-6876 - s3dvt_0.2.2 root shell vulnerability.The bug as previous one is caused by not checking the return values of setuid() and getuid() calls. The process must not continue its normal execution when any of these calls fail (return an error) to drop privileges.

AB - The s3dvt developers forgot to review all the code. There is still a vulnerable function as in the previous CVE-2013-6876 - s3dvt_0.2.2 root shell vulnerability.The bug as previous one is caused by not checking the return values of setuid() and getuid() calls. The process must not continue its normal execution when any of these calls fail (return an error) to drop privileges.

M3 - Other contribution

PB - http://hmarco.org

ER -