exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

greed.txt

greed.txt
Posted Dec 30, 2004
Authored by Manigandan Radhakrishnan

An input validation error that allows for arbitrary command execution and a buffer overflow exist in Greed 0.81p.

tags | advisory, overflow, arbitrary
SHA-256 | e30923d99ec472108172de0dad85a10cd5cd9e6a8d7e7de0283bcf056e33a5fa

greed.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:23:11 2004
Date: 15 Dec 2004 08:31:43 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, Anoakie.Turner@asu.edu, trevor@freebsd.org
Subject: [remote] [control] greed 0.81p DownloadLoop overflows COMMAND;
DownloadLoop does not check for nasty characters

Manigandan Radhakrishnan, a student in my Fall 2004 UNIX Security Holes
course, has discovered two remotely exploitable security holes in ``Get
and Resume Elite Edition'' (greed), an FTP/HTTP downloading tool. I'm
publishing this notice, but all the discovery credits should be assigned
to Radhakrishnan.

You are at risk if you take a GRX file list from an email message (or a
web page or any other source that could be controlled by an attacker)
and feed it through greed. Whoever provides that file list then has
complete control over your account: he can read and modify your files,
watch the programs you're running, etc.

A GRX file list includes local file names; local file names are
dangerous in a much more obvious way, and presumably are checked by the
user. These attacks work even if the local file names are innocent. The
greed documentation does not tell users to check the remote file names.

Proof of concept: On an x86 computer running FreeBSD 4.10, as root, type

cd /usr/ports/ftp/greed
make install

to download and compile the greed program, version 0.81p (latest ports
version). Then, as any user, save the file 68-1.grx attached to this
message, and type

greed -T -G68-1.grx -D0

with the unauthorized result that a file matching EXPLOIT* is created in
the current directory. (I tested this with a 613-byte environment, as
reported by printenv | wc -c; beware that 68-1.grx is sensitive to the
environment size.) 68-2.grx is similar, but uses a different bug, and
has the unauthorized result of removing a file named x in the current
directory.

Here are the bugs. First, in main.c, DownloadLoop() uses strcat() to
copy an input filename to the end of a 128-byte COMMAND array. Second,
DownloadLoop() passes the input filename to system() without checking
for special characters such as semicolons.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

[ Part 2, Text/PLAIN (charset: unknown-8bit) 4 lines. ]
[ Unable to print this part. ]


[ Part 3, Text/PLAIN 5 lines. ]
[ Unable to print this part. ]

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close