Gentoo Logo

Tomboy: User-assisted execution of arbitrary code

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-12 / tomboy
Release Date November 08, 2007
Latest Revision November 08, 2007: 01
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-misc/tomboy < 0.8.1-r1 >= 0.8.1-r1 All supported architectures

Related bugreports: #189249

Synopsis

Tomboy doesn't properly handle environment variables, potentially allowing a local attacker to execute arbitrary code.

2.  Impact Information

Background

Tomboy is a GTK-based desktop note-taking application written in C# and the Mono C#.

Description

Jan Oravec reported that the "/usr/bin/tomboy" script sets the "LD_LIBRARY_PATH" environment variable incorrectly, which might result in the current working directory (.) to be included when searching for dynamically linked libraries of the Mono Runtime application.

Impact

A local attacker could entice a user into running Tomboy in a directory containing a specially crafted library file to execute arbitrary code with the privileges of the user running Tomboy.

3.  Resolution Information

Workaround

Do not run Tomboy from an untrusted working directory.

Resolution

All Tomboy users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-misc/tomboy-0.8.1-r1"

4.  References



Print

Page updated November 08, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.