On Thu, 2 Feb 2012, Jakub Wilk wrote:

* Harry Sintonen <[email protected]>, 2012-01-31, 01:42:
-D_FORTIFY_SOURCE=2 was enabled in package version 1.8.3p1-3. See: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655417

This makes current sid package (1.8.3p1-3) safe.

Maybe. Maybe not. There are known ways of exploiting string format vulnerabilities even with -D_FORTIFY_SOURCE=2.

If you're referring to the glibc args_type[specs[cnt].width_arg] = PA_INT; 32-bit 0-write to reset the FORTIFY flag, sure it is possible, but rather painful with ASLR. It is true however that if you get to exploit this thing you run it locally, making it quite fast to bruteforce (albeit with some noise in the logs).

Of course I wasn't suggesting that you should skip updating to the fixed version or anything.

But agreed, "safe" was perhaps a bit too strong statement. "relatively safe" would have been more suitable.


  Regards,
--
l=2001;main(i){float o,O,_,I,D;for(;O=I=l/571.-1.75,l;)for(putchar(--l%80?
i:10),o=D=l%80*.05-2,i=31;_=O*O,O=2*o*O+I,o=o*o-_+D,o+_+_<4+D&i++<87;);puts
("  Harry 'Piru' Sintonen <[email protected]> http://www.iki.fi/sintonen";);}



--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to