26th Dec 2001 [SBWID-4957]
COMMAND
Perdition format string vulnerability
SYSTEMS AFFECTED
Perdition 0.1.8 (libvanessa_logger 0.0.1)
PROBLEM
GOBBLES Security reported [http://www.bugtraq.org/] :
--snip--
There exists a format string vulnerability in libvanessa_logger library
used by program perdition which allow remote penetrator to takeover
admin\'s server and he emails :(
$ id
uid=1001(GOBBLES) gid=1001(GOBBLES) groups=1001(GOBBLES)
$ # just making sure we are unpriviledged user!
$
$ telnet 0 110
Trying 0.0.0.0...
Connected to 0.
Escape character is \'^]\'.
+OK POP3 Ready freegobbles.bugtraq.org
USER GOBBLES_IS_TAKING_A_WALK_ON_HE_STACK->%p-%p-%p
+OK USER GOBBLES_IS_TAKING_A_WALK_ON_HE_STACK->%p-%p-%p set
PASS HEHEHE!
In systemlogs logged by program syslogd, GOBBLES notices:
Dec 18 06:23:36 freegobbles perdition[42804]: Connect: user=\"GOBBLES_IS_TAKING_A_WALK_ON_HE_STACK->0x8053140-0xbfbffb78-0x2807cc6c\" server=\"(null)\" port=\"110\"
While playing around a bit stupid program perdition suddenly dies :-(
Dec 18 16:24:53 freegobbles perdition[42898]: Exiting on signal 11
GOBBLES Labs find it to be very difficult bug to exploit but then
GOBBLES member Simon came up with clever thing and 8 hours later our
team got a bash# from it hehehe.
GOBBLES won\'t release an exploit this time because perdition appear to
be widely used (music&spam site mp3.com use perdition program) and
there are plenty of rpms, debs etc with indirect vulnerable perdition
program out there.
--snap--
SOLUTION
As a temporary fix GOBBLES modified libvanessa_logger.c:
- syslog(priority, vl->buffer);
+ syslog(priority, \"%s\", vl->buffer);
FreeBSD upgrade :
vanessa_logger 0.0.2 is available from
ftp://ftp.vergenet.net/pub/vanessa/vanessa_logger/0.0.2
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH