exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

plaguez.advisory.006.libxview.bo

plaguez.advisory.006.libxview.bo
Posted Sep 23, 1999

plaguez.advisory.006.libxview.bo

SHA-256 | 4df3cf25c6236b9cc8f1fe813baa87181a2992a0d85974043b727fb943ab66ad

plaguez.advisory.006.libxview.bo

Change Mirror Download

plaguez security advisory n. 6

libxview buffer overflows




Program: libxview
the XView toolkit library, an OpenLook user
interface development toolkit.

Version: current (3.2p1.4)
surely older ones (3.x verified).

OS: any OS running X11 and xview.

Problem: buffer overflows.

Impact: any setuid program using xview is vulnerable
and can be used to execute arbitrary
commands as the owner of the program.



hello,

guess what ! Yet another buffer overflow. This one is
in the xview library. Well, I should say buffer
overflowS because there are several overflows in the
code.
Most of them happen while getting and environment
variable and copying it into a fixed-length buffer.
I included in this post the summary of the overflows
i found.

Note that there may be others as well.


Affected functions:

------------------ dflts_put.c
static void node_write(path_name, file_name, status, flag)

------------------ font.c
static Font_locale_info *find_font_locale_info(server, avlist)

------------------ wckind.c
void _wckind_init()

------------------ server.c
Pkg_private int server_init(parent, server_public, avlist)
static void server_setlocale_to_default(server)
static void server_init_atoms(server_public)

------------------ txt_e_menu.c
Pkg_private char * textsw_get_extras_filename(mi)

------------------ tty_map_key.c
Pkg_private void ttysw_readrc(ttysw)




I included this list of vulnerabilities since I'm too lazy
and don't have time to make a patch.

For the exploits, well, eh, spot a setuid root xview program
and implement a standart buffer overflow with any affected
environment variable:
DEFAULT_FILES, OPENWINHOME, HOME, XVIEW_DEFAULT_LOCALE,
PROMPT,



that's all folks,

plaguez
dube0866@eurobretagne.fr




------------------------
plaguez / libpcap
dube0866@eurobretagne.fr
http://xxx.xxx.xxx
------------------------
ps: if you have a box at the end of a line
and would like to see www.plaguez.org instead
of xxx.xxx.xxx, please mail me ! :)
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close