what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

chbg.txt

chbg.txt
Posted Dec 30, 2004
Authored by Danny Lungstrom | Site tigger.uic.edu

A buffer overflow in the simplify_path() function of chbg version 1.5 allows for system compromise.

tags | advisory, overflow
SHA-256 | bfd94882b047dcdced5f8ba5482c352a9cb12f2dda7afa2715bd8fb6017e22fa

chbg.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:22:29 2004
Date: 15 Dec 2004 08:26:47 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, ondrej@users.sourceforge.net
Subject: [remote] [control] chbg 1.5 simplify_path overflows res buffer

Danny Lungstrom, a student in my Fall 2004 UNIX Security Holes course,
has discovered a remotely exploitable security hole in ChBg, a tool to
change background pictures. I'm publishing this notice, but all the
discovery credits should be assigned to Lungstrom.

You are at risk if, under Linux, you take a chbg scenario file---a list
of pictures to display---from an email message (or a web page or any
other source that could be controlled by an attacker). Whoever provides
that input then has complete control over your account: he can read and
modify your files, watch the programs you're running, etc.

Of course, when you accept a list of input filenames from someone else,
you are running the risk that those filenames include some of your
files, so that chbg will display some of your files (maybe secret
pictures). But the chbg documentation does not suggest that there is any
larger risk.

Proof of concept: On an x86 computer running Linux with gcc 2.95.4, type

wget http://unc.dl.sourceforge.net/sourceforge/chbg/chbg-1.5.tgz
gunzip < chbg-1.5.tgz | tar -xf -
cd chbg-1.5
./configure
make

to download and compile the chbg program, version 1.5 (current). Then
save the file 49.list attached to this message, and type

src/chbg -scenario 49.list

with the unauthorized result that a file named x is removed from the
current directory.

Here's the bug: In config.c, simplify_path() copies data into a
2048-byte res[] array. The amount of data is limited only by PATH_MAX,
which is 4096 under Linux. (FreeBSD is immune to this particular attack
because its PATH_MAX is only 1024.)

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

[ Part 2, Text/PLAIN (charset: unknown-8bit) 84 lines. ]
[ Unable to print this part. ]

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close