A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
{ "binaries": [ { "binary_version": "1:3.5.1-1ubuntu0.3", "binary_name": "amanda-client" }, { "binary_version": "1:3.5.1-1ubuntu0.3", "binary_name": "amanda-common" }, { "binary_version": "1:3.5.1-1ubuntu0.3", "binary_name": "amanda-server" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "1:3.5.1-2ubuntu0.3", "binary_name": "amanda-client" }, { "binary_version": "1:3.5.1-2ubuntu0.3", "binary_name": "amanda-common" }, { "binary_version": "1:3.5.1-2ubuntu0.3", "binary_name": "amanda-server" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "1:3.5.1-8ubuntu1.3", "binary_name": "amanda-client" }, { "binary_version": "1:3.5.1-8ubuntu1.3", "binary_name": "amanda-common" }, { "binary_version": "1:3.5.1-8ubuntu1.3", "binary_name": "amanda-server" } ], "availability": "No subscription required" }