A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
{
"binaries": [
{
"binary_version": "1:3.5.1-1ubuntu0.3",
"binary_name": "amanda-client"
},
{
"binary_version": "1:3.5.1-1ubuntu0.3",
"binary_name": "amanda-common"
},
{
"binary_version": "1:3.5.1-1ubuntu0.3",
"binary_name": "amanda-server"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "1:3.5.1-2ubuntu0.3",
"binary_name": "amanda-client"
},
{
"binary_version": "1:3.5.1-2ubuntu0.3",
"binary_name": "amanda-common"
},
{
"binary_version": "1:3.5.1-2ubuntu0.3",
"binary_name": "amanda-server"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "1:3.5.1-8ubuntu1.3",
"binary_name": "amanda-client"
},
{
"binary_version": "1:3.5.1-8ubuntu1.3",
"binary_name": "amanda-common"
},
{
"binary_version": "1:3.5.1-8ubuntu1.3",
"binary_name": "amanda-server"
}
],
"availability": "No subscription required"
}