{"vuid":"VU#700326","idnumber":"700326","name":"cdrecord fails to set proper permissions on programs specified in RSH environment variable","keywords":["cdrecord"],"overview":"Cdrecord can call external programs specified by the RSH environment variable. This may permit a malicious local user to gain elevated privileges.","clean_desc":"Cdrecord is an application used to create data or audio compact discs. Cdrecord permits the use of CD recorders on remote machines via an access program on the local machine. This access program is specified in the RSH environment variable. Cdrecord fails to drop the effective user ID (euid) when calling the program specified by the RSH environment variable.","impact":"By specifying a shell script of their own devising, malicious local users can execute arbitrary code with permissions of the cdrecord program. If cdrecord is suid root, the arbitrary code will run with root permissions.","resolution":"This issue is resolved in cdrtools 2.01, available at the cdrecord download page.","workarounds":"In general, do not run programs as setuid root if such a permission level is not required.","sysaffected":"","thanks":"Thanks to Max Vozeler for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://www.securitytracker.com/alerts/2004/Aug/1011091.html","http://secunia.com/advisories/12481/","http://xforce.iss.net/xforce/xfdb/17303"],"cveids":["CVE-2004-0806"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-24T13:49:05Z","publicdate":"2004-08-30T00:00:00Z","datefirstpublished":"2004-09-16T21:16:10Z","dateupdated":"2004-09-17T19:13:24Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.6875","cam_scorecurrentwidelyknown":"26.71875","cam_scorecurrentwidelyknownexploited":"48.09375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.6875,"vulnote":null}