The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[CERT-intexxia] libgtop_daemon Remote Format String Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 27 Nov 2001 08:07:48 +0100
From: =?iso-8859-1?Q?Beno=EEt_Roussel?= <[email protected]>
To: bugtraq <[email protected]>
Subject: [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability
Cc: CERT-intexxia <[email protected]>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
SECURITY ADVISORY                                            INTEXXIA(c)
27 11 2001                                               ID #1048-261101
________________________________________________________________________
TITLE   : libgtop_daemon Remote Format String Vulnerability
CREDITS : Guillaume Pelat / INTEXXIA
________________________________________________________________________


SYSTEM AFFECTED
===============

        libgtop_daemon <= 1.0.12


________________________________________________________________________


DESCRIPTION
===========

        The Laboratory intexxia found a remote exploitable format string
vulnerability in  libgtop_daemon which could cause  privilege escalation
on a remote system.


________________________________________________________________________


DETAILS
=======

        libgtop_daemon is a GNOME daemon used to monitor process running
on a remote system.

        The Laboratory  intexxia  just  found  a  remote  format  string
vulnerability in this daemon. The 2 functions named syslog_message() and
syslog_io_message() are called with a format string which is initialized
by the client.

        By sending a specially  crafted format string  to the server, it
is possible  for a  remote attacker  to execute  arbitrary code  on  the
remote  system  with  the  daemon  permissions. This vulnerability could
cause privilege escalation.

        The permitted() function, that verifies if  the client trying to
to connect is authorized to, is concerned by this flaw.

        The libgtop_daemon daemon is  launched with 'nobody' permissions
by default. Complete  exploitation of this  vulnerability will permit an
attacker to execute code  with the  'nobody' permissions.  But this flaw
could be used to compromize  the local system by  exploiting other local
vulnerabilities.


________________________________________________________________________


PROOF OF CONCEPT
================

        Here is a proof of concept to show where the problem occurs :

Client side :
~ % telnet 127.0.0.1 42800
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
%p%p
Connection closed by foreign host.
~ % telnet 127.0.0.1 42800
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
%n%n
Connection closed by foreign host.

Server side :
~/# libgtop_daemon -f
' from clientn[3877]: Invalid authentication protocol
'0xbffff46c0x804b2ae
libgtop-daemon[3877]: Refused connection from 127.0.0.1.
Segmentation fault


________________________________________________________________________


WORKAROUND
==========

        Although there is an official solution, here is the way to patch
the  sources to  resolve this  problem. The  file 'src/daemon/gnuserv.c'
must be modified :

In function syslog_message(), replace :
  syslog (priority, buffer);
by :
  syslog (priority, "%s", buffer);

And in function syslog_io_message(), replace :
  syslog (priority, buffer2);
by :
  syslog (priority, "%s", buffer2);


The Laboratory intexxia  developped the following  patch to correct this
vulnerability. However,  the simplest  and  probably  the  best  way  to
resolve this  issue is to  install the new  version at the above link in
the solution section :

  diff -dru libgtop-1.0.12/src/daemon/gnuserv.c
  libgtop-1.0.12-patched/src/daemon/gnuserv.c
  --- libgtop-1.0.12/src/daemon/gnuserv.c Mon Nov 26 13:48:14 2001
  +++ libgtop-1.0.12-patched/src/daemon/gnuserv.c Mon Nov 26 13:49:26 2001
  @@ -93,7 +93,7 @@
       vsnprintf (buffer, BUFSIZ-1, format, ap);
       va_end (ap);

  -    syslog (priority, buffer);
  +    syslog (priority, "%s", buffer);
   }
 
   void
  @@ -108,7 +108,7 @@
       va_end (ap);

       snprintf (buffer2, BUFSIZ-1, "%s: %s", buffer, strerror (errno));
  -    syslog (priority, buffer2);
  +    syslog (priority, "%s", buffer2);
   }
 
   /*


________________________________________________________________________


SOLUTION
========

        There is an official solution now. libgtop_daemon release 1.0.13
has been  made to  correct this  issue. Here  is a  link where  you  can
download it :

ftp://ftp.gnome.org/pub/GNOME/stable/sources/libgtop/libgtop-1.0.13.tar.gz


________________________________________________________________________


VENDOR STATUS
=============

        26-11-2001 : This  bulletin  was  sent   to  the  libgtop_daemon
                     developpment team.
        27-11-2001 : The  libgtop_daemon  developpement  team released a
                     new version including the patch for this issue.


________________________________________________________________________


DISCLAIMER
==========

        intexxia provides these informations as a public service and "as
is". Intexxia  will not be  held accountable for  any damage or distress
caused by the proper or improper usage of these materials.


________________________________________________________________________


DIFFUSION CRITERIA

(c) intexxia 2001. This document is property of intexxia. Feel free to use and distribute this material as long as credit is given to intexxia and the author. ________________________________________________________________________ CONTACT ======= CERT intexxia [email protected] INTEXXIA http://www.intexxia.com 171, av. Georges Clemenceau Standard : +33 1 55 69 49 10 92024 Nanterre Cedex - France Fax : +33 1 55 69 78 80 -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>; iQA/AwUBPAM7wU2N8BNyNDXLEQLdpQCg1Vi/4vbZQdRjj/1ymF3z1+umSqcAoLg4 FBeGXpWddc3WB6nKK5KMxnC9 =pmZw -----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру