Secunia Security Advisory - Gentoo has issued an update for silvercity. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.
d27bddfccf8b0f72f125ae71ec701470650c77611b4cdda0401780d8cbcfeea5
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Gentoo update for silvercity
SECUNIA ADVISORY ID:
SA15632
VERIFY ADVISORY:
http://secunia.com/advisories/15632/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Gentoo Linux 1.x
http://secunia.com/product/339/
DESCRIPTION:
Gentoo has issued an update for silvercity. This fixes a security
issue, which can be exploited by malicious, local users to gain
escalated privileges.
The problem is that the executable scripts "cgi-styler-form.py",
"cgi-styler.py", and "source2html.py" are created world-writable and
can be modified. This can be exploited to execute arbitrary code with
the privileges of the user running one of the modified scripts.
SOLUTION:
Update to "app-text/silvercity-0.9.5-r1" or later.
PROVIDED AND/OR DISCOVERED BY:
Jürgen Hötzel
ORIGINAL ADVISORY:
http://www.gentoo.org/security/en/glsa/glsa-200506-05.xml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------