what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

_SRT2003-TURKEY-DAY.txt

_SRT2003-TURKEY-DAY.txt
Posted Dec 1, 2003
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2003-TURKEY-DAY - Administrators using the traceroute detection utility published in Phrack Volume 7, Issue 51 may be leaving themselves exploitable to a format strings issue in detecttr.c.

tags | advisory
SHA-256 | 33e3182819127da3ad076e5420778a32b82010b43f282830765514729f9307f2

_SRT2003-TURKEY-DAY.txt

Change Mirror Download
Secure Network Operations, Inc.             http://www.secnetops.com/research
Strategic Reconnaissance Team research@secnetops.com
Team Lead Contact kf@secnetops.com


Our Mission:
************************************************************************
Secure Network Operations offers expertise in Networking, Intrusion
Detection Systems (IDS), Software Security Validation, and
Corporate/Private Network Security. Our mission is to facilitate a
secure and reliable Internet and inter-enterprise communications
infrastructure through the products and services we offer.

To learn more about our company, products and services or to request a
demo of ANVIL FCS please visit our site at http://www.secnetops.com, or
call us at: 978-263-3829


Quick Summary:
************************************************************************
Advisory Number : SRT2003-TURKEY-DAY *Gobble* *Gobble*
Product : detecttr.c
Version : modified on 11.07.97
Vendor : baldor - http://phrack.org/show.php?p=51&a=3
Class : Remote
Criticality : Low
Operating System(s) : Linux, FreeBSD, and other POSIX-systems


Notice
************************************************************************
The full technical details of this vulnerability can be found at:
http://www.secnetops.com/research/advisories/SRT2003-TURKEY-DAY.txt


Basic Explanation
************************************************************************
High Level Description : detecttr has format strings issues.
What to do : properly format the syslog call and recompile.


Basic Technical Details
************************************************************************
Proof Of Concept Status : SNO has proof of concept.

Low Level Description : Phrack Magazine Volume 7, Issue 51 which was
released on September 01, 1997 contained an article titled "Tools for
(paranoid ?) linux users" by an author known as baldor. This article was
featured as part of the "Line Noise" located in section 0x04 from article
03 of 17. In this article the author introduces a program for detecting
traceroute activity. You can find this program in a variety of places
including security archives, unix tool libraries, and search engines.

The program in question is detecttr.c and it contains a remotely
exploitable format strings issue. I have not yet decided if this was a
deliberately placed backdoor or if it was a simple coding mistake.

Either way...line 140 of detecttr.c is the problem child which leads to
potential exploitation. DNS libraries during the time the article was
written may have been ripe for easy exploitation of this issue. Passing
a hostname directly to syslog() without a format specifier is a bad idea
in most cases.

Work Around : Apply the below code change.

change syslog(LOG_NOTICE , buf);
to syslog(LOG_NOTICE , "%s" , buf);

Bugtraq URL : To be assigned.
Disclaimer
----------------------------------------------------------------------
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories but can be obtained under contract.. Contact our sales
department at sales@secnetops.com for further information on how to
obtain proof of concept code.

----------------------------------------------------------------------
Secure Network Operations, Inc. || http://www.secnetops.com
"Embracing the future of technology, protecting you."



Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close