Rootkit Hunter: User-assisted execution of arbitrary code — GLSA 201805-11

A vulnerability has been found in Rootkit Hunter that allows a remote attacker to execute arbitrary code.

Affected packages

app-forensics/rkhunter on all architectures
Affected versions < 1.4.6
Unaffected versions >= 1.4.6

Background

Scans for known and unknown rootkits, backdoors, and sniffers.

Description

A vulnerability was discovered in Rootkit Hunter that allows the downloading of mirror updates over insecure channels (HTTP). Furthermore, the mirror update is then executed in Bash.

Impact

A remote attacker, by performing a man-in-the-middle attack, could execute arbitrary code, conduct a Denial of Service, or have other unspecified impacts.

Workaround

Users are advised to not trust insecure protocols such as HTTP and to turn off any mirror updates utilizing such channels.

Resolution

All Rootkit Hunter users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-forensics/rkhunter-1.4.6"
 

References

Release date
May 26, 2018

Latest revision
May 26, 2018: 1

Severity
normal

Exploitable
remote

Bugzilla entries