Summary
CESG discovered a root escalation flaw in the acpi-support package. An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 0.140-5+deb7u1.
For the testing distribution (jessie), this problem has been fixed in version 0.142-2.
For the unstable distribution (sid), this problem has been fixed in version 0.142-2.
We recommend that you upgrade your acpi-support packages.
Insight
This package contains scripts to react to various ACPI events. It only includes scripts for events that can be supported with some level of safety cross platform.
Affected
acpi-support on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-1419 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities