Debian DSA-189-1 : luxman - local root exploit

high Nessus Plugin ID 15026

Synopsis

The remote Debian host is missing a security-related update.

Description

iDEFENSE reported about a vulnerability in LuxMan, a maze game for GNU/Linux, similar to the PacMan arcade game. When successfully exploited a local attacker gains read-write access to the memory, leading to a local root compromise in many ways, examples of which include scanning the file for fragments of the master password file and modifying kernel memory to re-map system calls.

Solution

Upgrade the luxman package immediately.

This problem has been fixed in version 0.41-17.1 for the current stable distribution (woody) and in version 0.41-19 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain a luxman package.

See Also

http://www.idefense.com/advisory/11.06.02.txt

http://www.debian.org/security/2002/dsa-189

Plugin Details

Severity: High

ID: 15026

File Name: debian_DSA-189.nasl

Version: 1.16

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:luxman

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 11/6/2002

Reference Information

CVE: CVE-2002-1245

DSA: 189