During an ethical hacking class, a student found a zero-day vulnerability affecting the last version of Backtrack Linux.
With the class organized by the InfoSec Institute, the discovery was made public on InfoSec’s own website and detailed by the student himself, who said the Wireless Interface Connection Daemon (WICD) Backtrack components has several design flaws that can lead to execute a privilege escalation exploit.
“Improper sanitization of the inputs in the WICD’s DBUS interfaces allows an attacker to (semi)arbitrarily write configuration options in WICD’s ‘wireless-settings.conf’ file, including but not limited to defining scripts (executables actually) to execute upon various internal events (for instance upon connecting to a wireless network),” the student said.
“These scripts execute as the root user, this leads to arbitrary code/command execution by an attacker with access to the WICD DBUS interface as the root user.”
The student and the InfoSec team immediately started on working on a proof-of-concept exploit and the patch for the vulnerability, all provided on the group’s site.
Backtrack is a Linux distribution popular with penetration testers all over the world because it comes preloaded with hundreds of handy security tools. The vulnerability affects the latest version: Backtrack 5 R2.
Users can use the patch offered by the group or, better yet, update WICD to the new version (1.7.2) which fixes the vulnerability.