The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


DoS and code execution issue in LedgerSMB < 1.1.5 and SQL-Ledger


<< Previous INDEX Search src / Print Next >>
Date: Mon, 05 Mar 2007 11:43:36 -0800
From: Chris Travers <chris@metatrontech.com.>
To: [email protected]
Subject: DoS and code execution issue in LedgerSMB < 1.1.5 and SQL-Ledger
 < 2.6.25
Content-Type: multipart/mixed;
 boundary="------------010407010805090809020509"
X-Virus-Scanned: antivirus-gw at tyumen.ru

This is a multi-part message in MIME format.
--------------010407010805090809020509
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Hi;

A person on the LedgerSMB core team has found a serious arbitrary code 
execution issue in LedgerSMB prior to 1.1.5 and SQL-Ledger.  A version 
of SQL-Ledger which fixes this vulnerability was released today (version 
2.6.25).

The vulnerability allows a user to specify a custom function to run when 
the software encounters an error.  The software further assumes that the 
error function specified never returns.  For this reason, it is possible 
to cause the software to take alternate paths of execution, and to force 
these paths.  This is particularly dangerous for users with valid logins.

For those which do not have valid login credentials, the problem more 
limited but still quite dangerous.  Using this method it is possible to 
overwrite files in the users directory, thus affecting a DoS attack and 
possible authentication bypass.

The DoS attacks can be done by any user not currently logged in, and can 
force the writing of a nologin file (which will lock users out of the 
system) or overwrite the users/members file (which contains users' 
credentials info and settings) with invalid data.  This attack can be 
done with wget, for example.

All SQL-Ledger users are advised to upgrade to the latest version, and 
all LedgerSMB users using versions prior to 1.1.5 should upgrade as well.

Best Wishes,
Chris Travers

--------------010407010805090809020509
Content-Type: text/x-vcard; charset=utf-8;
 name="chris.vcf"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename="chris.vcf"

begin:vcard
fn:Chris Travers
n:Travers;Chris
email;internet:[email protected]
tel;work:509-888-0220
tel;cell:509-630-7794
x-mozilla-html:FALSE
version:2.1
end:vcard


--------------010407010805090809020509--


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру