GLSA-200601-01 : pinentry: Local privilege escalation

medium Nessus Plugin ID 20411

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200601-01 (pinentry: Local privilege escalation)

Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that the pinentry ebuild incorrectly sets the permissions of the pinentry binaries upon installation, so that the sgid bit is set making them execute with the privileges of group ID 0.
Impact :

A user of pinentry could potentially read and overwrite files with a group ID of 0.
Workaround :

There is no known workaround at this time.

Solution

All pinentry users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-crypt/pinentry-0.7.2-r2'

See Also

https://security.gentoo.org/glsa/200601-01

Plugin Details

Severity: Medium

ID: 20411

File Name: gentoo_GLSA-200601-01.nasl

Version: 1.14

Type: local

Published: 1/15/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:pinentry, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 1/3/2006

Vulnerability Publication Date: 1/3/2006

Reference Information

CVE: CVE-2006-0071

GLSA: 200601-01