exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

idefense.linuxconf.txt

idefense.linuxconf.txt
Posted Aug 29, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 08.28.2002 - A local buffer overflow vulnerability exists in linuxconf v1.28r3 and below which allows users to spawn a root shell on Linux 7.3. Fix available here.

tags | overflow, shell, local, root
systems | linux
SHA-256 | f9ba1eb1fdc12f40a3c9d1f1c58751fb4592b6d5203e97240852745915ace9d3

idefense.linuxconf.txt

Change Mirror Download
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 08.28.2002
Linuxconf locally exploitable buffer overflow vulnerability

DESCRIPTION

A vulnerability exists in linuxconf which if the
LINUXCONF_LANG environment variable processes at least 964
bytes of data, a buffer overflow occurs, thereby allowing an
attacker to modify the return address of the function and
execute arbitrary code with root permissions. iDEFENSE has an
exploit that allows a local user to launch a root shell on Red
Hat Linux 7.3 by targeting the latest version of linuxconf
1.28r3.


ANALYSIS

According to the author of Linuxconf, Jacques Gelinas
jack@solucorp.qc.ca, "linuxconf picks the variable and uses it
to format a path using snprintf. This works fine. In fact, the
receiving buffer is PATH_MAX large so even a 1000 characters
variable won't overflow it and even if this was the case,
snprintf would do its work.

Once the path is formatted, the corresponding file is opened.
If the file do not exist, an error message is formatted in a
string. This was the problem and sprintf was used instead of
snprintf there.

There are two fixes. One is to use snprintf to format error
message at this place and the other is to look for appropriate
length for this variable (max 5 characters) immediately when it
is found."


DETECTION

This vulnerability affects any version of linuxconf
(essentially 6 years worth of distributions) that is installed
setuid root. Generally, the four ways in which this utility
can be installed setuid are:

1.) Shipped by vendor (Red Hat does not ship linuxconf
setuid, but Mandrake does as do other linux vendors)
2.) Installed by RPM from the main site
(http://www.solucorp.qc.ca/linuxconf/) for each particular
linux OS (installs setuid root by default)
3.) Installed by source code also from main site
(http://www.solucorp.qc.ca/linuxconf/) but prompts for whether
to install setuid root
4.) Installed in ways 1, 2, or 3 and manually set to setuid
root by the user for added functionality.


WORKAROUND

Remove the setuid bit from the linuxconf binary:

$ chmod u-s /bin/linuxconf


VENDOR RESPONSE

iDEFENSE immediately contacted Jacques Gelinas and he provided
a source code patch. iDEFENSE verified that the vulnerability
is mitigated in the newer distribution (1.28r4) of linuxconf.

An updated version (1.28r4) of linuxconf which addresses this
vulnerability will be available on August 28, 2002 at
http://www.solucorp.qc.ca/linuxconf/ .

Affected Linux vendors will make updates available
August 28th, 2002.


DISCLOSURE TIMELINE


August 9, 2002 - Exclusively disclosed to iDEFENSE
August 19, 2002 - Disclosed to Vendor
August 19, 2002 - Disclosed to iDEFENSE clients
August 21, 2002 - Announcement to vendor-sec@lst.de
August 28, 2002 - Coordinated public disclosure by Linux vendors,
Linuxconf maintainer, and iDEFENSE


CREDIT

This issue was exclusively disclosed to iDEFENSE by Euan Briggs
(euan_briggs@btinternet.com)


http://www.idefense.com/contributor.html


- - -dave


David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

dendler@idefense.com
www.idefense.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1.1

iQA/AwUBPWzPr0rdNYRLCswqEQK4BQCfRNs+pQacI3q7eFNibtkQ8CQ+OlQAoOil
L8EJZISNsIFSig7PD4Uip392
=SStn
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close