GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Oct 04, 2005 6:25 pm Post subject: [ GLSA 200510-03 ] Uim: Privilege escalation vulnerability |
|
|
Gentoo Linux Security Advisory
Title: Uim: Privilege escalation vulnerability (GLSA 200510-03)
Severity: normal
Exploitable: local
Date: October 04, 2005
Updated: May 22, 2006
Bug(s): #107748
ID: 200510-03
Synopsis
Under certain conditions, applications linked against Uim suffer from a
privilege escalation vulnerability.
Background
Uim is a multilingual input method library which provides secure and
useful input method for all languages.
Affected Packages
Package: app-i18n/uim
Vulnerable: < 0.4.9.1
Unaffected: >= 0.4.9.1
Architectures: All supported architectures
Description
Masanari Yamamoto discovered that Uim uses environment variables
incorrectly. This bug causes a privilege escalation if setuid/setgid
applications are linked to libuim. This bug only affects
immodule-enabled Qt (if you build Qt 3.3.2 or later versions with
USE="immqt" or USE="immqt-bc").
Impact
A malicious local user could exploit this vulnerability to execute
arbitrary code with escalated privileges.
Workaround
There is no known workaround at this time.
Resolution
All Uim users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.9.1" |
References
Original advisory
CVE-2005-3149
Last edited by GLSA on Sat Apr 12, 2014 4:21 am; edited 6 times in total |
|