TUCoPS :: Web :: General :: web5279.htm

AOLServer DB Proxy Daemon Format String Vulnerability
17th Apr 2002 [SBWID-5279]

	AOLServer DB Proxy Daemon Format String Vulnerability


	AOLServer 3.4.2, 3.4.1, 3.4, 3.3.1, 3.2.1, 3.2, 3.1, 3.0


	From Guillaume  Pelat  of  INTEXXIA  [http://www.intexxia.com]  security
	advisory [ID #1052-300102] :

	AOL Server provides an API to develop external database driver proxy  daemons.
	Those daemons are linked to a library (libnspd.a).

	The Laboratory intexxia found a format  string  and  a  buffer  overflow
	vulnerability in the \'Ns_PdLog\' function  of  the  library.  Successful
	exploitation of the bug could allow an attacker to execute code and  get
	access on the system.

	As  a  result,  all  the  External  Driver  Proxy  Daemons   using   the
	\'Ns_PdLog\'  function  with  the  \'Error\'  or  \'Notice\'   parameter
	are  potentially vulnerable.


	This vulnerability has been fixed in the current version in  CVS  branch
	nsd_v3_r3_p0 (post-AOLserver 3.4.2) and can be  used  for  any  affected
	version. The patch used was created by intexxia  and  can  be  found  in
	attachment. More  information can  be found  at the  following URL :




	diff -dru aolserver-3.4.2/nspd/log.c aolserver-3.4.2-patched/nspd/log.c


	--- aolserver-3.4.2/nspd/log.c	Tue Aug 15 22:24:33 2000

	+++ aolserver-3.4.2-patched/nspd/log.c	Wed Jan 30 09:03:11 2002

	@@ -206,14 +206,13 @@

	             char msgbuf[4096];


	             va_start(ap, format);

	-            vsprintf(msgbuf, format, ap);

	+            vsnprintf(msgbuf, sizeof (msgbuf), format, ap);


	-            syslog(priority, msgbuf);

	+            syslog(priority, \"%s\", msgbuf);












TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH