oss-sec mailing list archives
Re: CVE request: feh
From: Josh Bressers <bressers () redhat com>
Date: Mon, 28 Jun 2010 16:12:58 -0400 (EDT)
Please use CVE-2010-2246 Thanks. -- JB ----- "Daniel Friesel" <derf () chaosdorf de> wrote:
Hi, there is an arbitrary code execution hole in feh versions <= 1.7 down to at least 1.3.4 (I didn't check earlier ones). When the user uses feh to open a remote file (URL) and uses the --wget-timestamp option, feh passe the unescaped URL to a system() call. So if an attacker can trick the user into opening an image URL containing shell metacharacters with feh --wget-timestamp, he is able to execute arbitrary shell code with the rights of the user executing feh. This requires the URL to resolve to an existing file, however. Obfuscating the shell code with HTTP escapes (like %20) does not seem to work, and a redirect (via tinyurl or similar) to a malicious URL will also have no effect. Example: remnant /t/feh > ls remnant /t/feh > feh --wget-timestamp 'https://derf.homelinux.org/stuff/bar`touch lol_hax`.jpg' /bin/cp: cannot stat `/tmp/feh_011422_bar.jpg': No such file or directory feh WARNING: /tmp/feh_011422_000001_bar`touch lol_hax`.jpg does not exist - skipping feh WARNING: /tmp/feh_011422_000001_bar`touch lol_hax`.jpg - File does not exist feh - No loadable images specified. Use feh --help for detailed usage information remnant /t/feh > ls lol_hax remnant /t/feh > This has been fixed in feh 1.8: <https://derf.homelinux.org/projects/feh/changelog> Please assign a CVE. Thanks, Daniel
Current thread:
- CVE request: feh Daniel Friesel (Jun 25)
- Re: CVE request: feh Josh Bressers (Jun 28)