vendor:
mtr
by:
babcia padlina / buffer0verfl0w security
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: mtr
Affected Version From: 0.41
Affected Version To: 0.42
Patch Exists: YES
Related CWE: N/A
CPE: a:matt_kimball:mtr
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2000
FreeBSD mtr-0.41 Local Root Exploit
A potential vulnerability exists in the 'mtr' program, by Matt Kimball and Roger Wolff. Versions prior to 0.42 incorrectly dropped privileges on all Unix variants except HPUX. By calling a seteuid(getuid()) call, the authors hoped to drop permissions to prevent the obtaining of root privilege should there be potential vulnerabilities in mtr or a library it depends on. However, due to saved uid semantics, the uid of 0 can be recovered simply by doing a setuid(0). An attacker would only need to find an overflow in one of the libraries mtr uses, such as gtk or curses. In patched versions, the seteuid() call has been changed to setuid(). This will eliminate this potential problem.
Mitigation:
Upgrade to the latest version of mtr