fedora 23
access weakness #56

4

Weakness Breakdown


Definition:

An access weakness occurs when software does not properly implement permissions that could have unintended consequences if exploited by malicious actors. An example of this weakness is when a default username and password are set by the developer but do not get changed by the system administrator.

Warning code(s):

If this call fails, the program could fail to drop heightened privileges.

File Name:

wine-mono-4.6.3/mono/mono/io-layer/security.h

Context:

The highlighted line of code below is the trigger point of this particular Fedora 23 access weakness.

 /*
 * security.h:  Security
 *
 * Author:
 *	Sebastien Pouliot  <sebastien@ximian.com>
 *
 * (C) 2004 Novell (http://www.novell.com)
 */

#ifndef _WAPI_SECURITY_H_
#define _WAPI_SECURITY_H_

#include <glib.h>

G_BEGIN_DECLS

extern gboolean ImpersonateLoggedOnUser (gpointer handle);
extern gboolean RevertToSelf (void);

G_END_DECLS

#endif /* _WAPI_SECURITY_H_ */ 

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.