From nobody@FreeBSD.org  Tue Dec 13 04:39:55 2011
Return-Path: <nobody@FreeBSD.org>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id E5DD31065670
	for <freebsd-gnats-submit@FreeBSD.org>; Tue, 13 Dec 2011 04:39:55 +0000 (UTC)
	(envelope-from nobody@FreeBSD.org)
Received: from red.freebsd.org (red.freebsd.org [IPv6:2001:4f8:fff6::22])
	by mx1.freebsd.org (Postfix) with ESMTP id D51D68FC13
	for <freebsd-gnats-submit@FreeBSD.org>; Tue, 13 Dec 2011 04:39:55 +0000 (UTC)
Received: from red.freebsd.org (localhost [127.0.0.1])
	by red.freebsd.org (8.14.4/8.14.4) with ESMTP id pBD4dtY3023297
	for <freebsd-gnats-submit@FreeBSD.org>; Tue, 13 Dec 2011 04:39:55 GMT
	(envelope-from nobody@red.freebsd.org)
Received: (from nobody@localhost)
	by red.freebsd.org (8.14.4/8.14.4/Submit) id pBD4dtId023296;
	Tue, 13 Dec 2011 04:39:55 GMT
	(envelope-from nobody)
Message-Id: <201112130439.pBD4dtId023296@red.freebsd.org>
Date: Tue, 13 Dec 2011 04:39:55 GMT
From: Axel Gonzalez <loox@e-shell.net>
To: freebsd-gnats-submit@FreeBSD.org
Subject: privilege escalation with openpam
X-Send-Pr-Version: www-3.1
X-GNATS-Notify:

>Number:         163224
>Category:       i386
>Synopsis:       privilege escalation with openpam
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-i386
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Dec 13 04:40:09 UTC 2011
>Closed-Date:    Tue Dec 13 07:47:25 UTC 2011
>Last-Modified:  Tue Dec 13 07:47:25 UTC 2011
>Originator:     Axel Gonzalez
>Release:        FreeBSD 9.0-RC1
>Organization:
>Environment:
FreeBSD moonlight 9.0-RC1 FreeBSD 9.0-RC1 #0: Fri Oct 28 22:53:45 CDT 2011 toor@moonlight:/usr/obj/usr/src/sys/LXCORE9 i386
>Description:
Directory traversal vulnerability in openpam_configure.c in OpenPAM before r478 on FreeBSD 8.1 allows local users to load arbitrary DSOs and gain privileges via a .. (dot dot) in the service_name argument to the pam_start function, as demonstrated by a .. in the -c option to kcheckpass.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4122


Note that there have been changes in openpam that prevnt this:

http://trac.des.no/openpam/changeset/493/trunk/lib/openpam_dynamic.c


This problem was previously reported:

http://www.freebsd.org/cgi/query-pr.cgi?pr=162735

I'm filling a new PR with openpam as the problem, not kcheckpass (since this PR is closed now).

>How-To-Repeat:
http://c-skills.blogspot.com/2011/11/openpam-trickery.html

>Fix:
update to new version

>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: remko 
State-Changed-When: Tue Dec 13 07:47:24 UTC 2011 
State-Changed-Why:  
This will be handled within secteam. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=163224 
>Unformatted:
