Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

EGI CSIRT:Alerts/intel-28-06-2010

From EGIWiki
Revision as of 07:50, 28 June 2010 by Kouril (talk | contribs) (Created page with '{{Egi-csirt-header|High-risk vulnerabilities in CREAM CE software}} <pre><nowiki> EGI CSIRT ADVISORY [EGI-ADV-20100628] Moderate Impact Vulnerability In Intel Compiler Suite S…')
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


| Mission | Members | Contacts
| Incident handling | Alerts | Monitoring | Security challenges | Procedures | Dissemination



EGI CSIRT ADVISORY [EGI-ADV-20100628]

Moderate Impact Vulnerability In Intel Compiler Suite


Summary

A vulnerability caused by bad file permissions has been identified in
products belonging to the Intel compiler suite. The vulnerability can be
used by local attackers to compromise other users' accounts.

This advisory is based on publically available information and
investigations performed by the EGI Security Vulnerability Group
and the EGI CSIRT.


Details

During the installation of the Intel Math Kernel Library (MKL -
http://software.intel.com/en-us/intel-mkl/) several files are installed
world-writable, including configuration files that are intended to be
sourced by all users of the MKL libraries. This makes it trivial for a
local attacker to compromise the accounts of other users.

It appears that these issues were quietly corrected in December 2009.
However, MKL components are included in several different products in
the Intel compiler suite, which makes it hard to say exactly which
versions are affected. At the time of writing, no advisory about the
issue is available from Intel.


Recommended Actions

This vulnerability can easily be corrected by searching for
world-writable files in the Intel installation directory tree, e.g. with

 find /opt/intel/ -type f -perm -o=w -ls

and fixing the permissions with

 find /opt/intel/ -type f -perm -o=w -print0 | xargs -0 chmod go-w

(please replace "/opt/intel" with any site-specific installation directory).