oss-sec mailing list archives
Re: CVE id request: verlihub
From: Eygene Ryabinkin <rea-sec () codelabs ru>
Date: Sun, 28 Dec 2008 00:02:51 +0300
Steven, good day. Wed, Dec 24, 2008 at 12:54:14PM -0500, Steven M. Christey wrote:
====================================================== Name: CVE-2008-5706 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5706 Reference: MILW0RM:7183 Reference: URL:http://www.milw0rm.com/exploits/7183 Reference: MLIST:[oss-security] 20081216 CVE id request: verlihub Reference: URL:http://openwall.com/lists/oss-security/2008/12/17/16 Reference: MISC:http://bugs.debian.org/506530 The cTrigger::DoIt function in src/ctrigger.cpp in the trigger mechanism in the daemon in Verlihub 0.9.8d-RC2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/trigger.tmp temporary file.
What about remote command execution via unsanitized user input? It will work only if the server had executable triggers and 'allow_exec' is set to 1. By the way, CVE-2008-5706 will be triggered ;)) only for this case too. If anyone is interested, I had reworked the original patch at MilW0rm. Original patch was mangling results of std::string.c_str() and sanitizing not only user-supplied part, but the whole command. The result is attached and comments are very welcome. -- Eygene
Attachment:
patch-CVE-2008-5706
Description:
Current thread:
- CVE id request: verlihub Raphael Geissert (Dec 16)
- Re: CVE id request: verlihub Steven M. Christey (Dec 24)
- Re: CVE id request: verlihub Eygene Ryabinkin (Dec 27)
- Re: CVE id request: verlihub Nico Golde (Dec 27)
- Re: CVE id request: verlihub Eygene Ryabinkin (Dec 27)
- Re: CVE id request: verlihub Steven M. Christey (Dec 24)