exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

jpegtoavi.txt

jpegtoavi.txt
Posted Dec 30, 2004
Authored by James Longstreet

jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.

tags | advisory, overflow
SHA-256 | 6aa04b2b8cb6f9f6ed955f347b513ea25c78b28773707235e13381e33f38860c

jpegtoavi.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:20:49 2004
Date: 15 Dec 2004 08:16:04 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, di77ihd@users.sourceforge.net
Subject: [remote] [control] jpegtoavi 1.5 get_file_list_stdin overflows fn
buffer

James Longstreet, a student in my Fall 2004 UNIX Security Holes course,
has discovered a remotely exploitable security hole in jpegtoavi. I'm
publishing this notice, but all the discovery credits should be assigned
to Longstreet.

You are at risk if you take jpegtoavi input---a set of JPEG files and a
file listing the names of the JPEG files---from an email message (or a
web page or any other source that could be controlled by an attacker).
Whoever provides that input then has complete control over your account:
he can read and modify your files, watch the programs you're running,
etc.

Of course, when you accept a list of input filenames from someone else,
you are running the risk that those filenames include some of your
files, so that the jpegtoavi output will include some of your files
(maybe secret pictures). But the jpegtoavi documentation does not
suggest that there is any larger risk.

Proof of concept: On an x86 computer running Linux with gcc 2.95.4, type

wget http://umn.dl.sourceforge.net/sourceforge/jpegtoavi/jpegtoavi-1.5.tar.gz
gunzip < jpegtoavi-1.5.tar.gz | tar -xf -
cd jpegtoavi-1.5
make

to download and compile the jpegtoavi program. Then save the file
10.list attached to this message, and type

./jpegtoavi -f 1 640 480 < 10.list

with the unauthorized result that a directory named ``hacked'' is
created inside the current directory.

Here's the bug: In jpegtoavi.c, get_file_list_stdin() uses an
unprotected %s scanf to read any number of bytes into an fn[] array.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

[ Part 2, Text/PLAIN (charset: unknown-8bit) 95 lines. ]
[ Unable to print this part. ]

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close