Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10855
HistoryDec 30, 2005 - 12:00 a.m.

[SA18235] XnView / NView Insecure RPATH Vulnerability

2005-12-3000:00:00
vulners.com
11

TITLE:
XnView / NView Insecure RPATH Vulnerability

SECUNIA ADVISORY ID:
SA18235

VERIFY ADVISORY:
http://secunia.com/advisories/18235/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

SOFTWARE:
XnView 1.x
http://secunia.com/product/6705/
NView 4.x
http://secunia.com/product/6706/

DESCRIPTION:
nelchael has discovered a vulnerability in XnView / NView, which can
be exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an insecure RPATH being configured
in the distributed "nview" and "xnview" binaries. This causes the
affected binaries to look for shared libraries within the current
working directory first. This can be exploited to execute arbitrary
code with privileges of the user running the affected binaries by
causing the binaries to load a malicious shared library (e.g.
libXcursor.so) from the current directory.

Successful exploitation requires that the user runs the affected
binaries from a directory that other users can write to.

The vulnerability has been confirmed in XnView version 1.70 and NView
version 4.51. Other versions may also be affected.

SOLUTION:
Do not run the affected binaries when in a working directory that is
writable by other users.

PROVIDED AND/OR DISCOVERED BY:
nelchael

ORIGINAL ADVISORY:
Gentoo Bugzilla:
http://bugs.gentoo.org/show_bug.cgi?id=117063


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.