Bug ID | 957624 |
---|---|
Summary | Wireshark privilege separation |
Classification | openSUSE |
Product | openSUSE Tumbleweed |
Version | 2015* |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Enhancement |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | astieger@suse.com |
QA Contact | qa-bugs@suse.de |
CC | cyliu@suse.com, security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
Wireshark is currently executed as root: /usr/share/applications/wireshark.desktop Exec=/usr/bin/xdg-su -c /usr/bin/wireshark %f /usr/share/applications/wireshark-gtk.desktop Exec=/usr/bin/xdg-su -c /usr/bin/wireshark-gtk %f Many Vulnerabilities in Wireshark affect the dissector UI. Their effect will be reduced root level to user level if the privileged were separated. It is sufficient to give CAP_NET_RAW and CAP_NET_ADMIN to /usr/sbin/dumpcap and make it executable by a group. https://wiki.wireshark.org/CaptureSetup/CapturePrivileges The group would be called "wireshark" and users would need to be added to the group. Ideally a warning would be shown to advise users of the fact.