severity 537604 important
thanks

Hi,
* Piotr Engelking <[email protected]> [2009-07-19 20:39]:
> If scrot is installed, users are able to overwrite arbitrary files in the
> filesystem.
> 
> Pressing F11 on the slim login screen runs scrot with the root rights to
> save a screenshot to /tmp/slim.png. If this file is symlinked to another
> location, that location is overwritten instead.
> 
> This bug is introduced by debian/patches/slim-conf.patch and hence
> Debian-specific - upstream saves the screenshot in the directory that is
> only writable by root.

I am lowering the severity given that this exploit scenario 
is rather constructed. This requires scrot which is neither 
in Depends nor in Recommends (but in Suggests) and the 
attacker needs local access as well as physical access (or 
waiting for the victim to press F11 which is even more 
unlikely)  to the machine itself. I guess using one of the 
many local root exploits is way more likely ;) Anyway, you 
are right, it's a security issue.

Cheers
Nico
P.S. I am not the maintainer
-- 
Nico Golde - http://www.ngolde.de - [email protected] - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpey7Lj6iuST.pgp
Description: PGP signature

Reply via email to