BSD ftpd Single Byte Buffer Overflow Vulnerability BugTraq ID: 2124 Remote: Yes Date Published: 2000-12-18 Relevant URL: http://www.securityfocus.com/bid/2124 Summary: The ftp daemon derived from 4.x BSD source contains a serious vulnerability that may compromise root access. There exists a one byte overflow in the replydirname() function. The overflow condition is due to an off-by-one bug that allows an attacker to write a null byte beyond the boundaries of a local buffer and over the lowest byte of the saved base pointer. As a result, the numerical value of the pointer decreases (and it thus points to a higher location (or lower address) on the stack than it should) and when the replydirname() function returns, the modified saved base pointer is stored in the base pointer register. When the calling function returns, the return address is read from an offset of where the base pointer points to. With the last byte of the base pointer zero, this will be a location other than where it should be. If this region of the stack is under the control of the attacker, such as the local variable which contained the extra byte in the first place, an arbitrary address can be placed there that will be used as the saved return address by the function. This is the case in ftpd. It is possible for an attacker to force the ftp daemon to look in user-supplied data for a return address and then execute instructions at the location as root. This vulnerability can be exploited on systems supporting anonymous ftp if a writeable directory exists (such as an "incoming" directory). This is rarely in place by default. It should noted that OpenBSD ships with ftp disabled, though it is an extremely commonly used service. Stunnel Local Arbitrary Command Execution Vulnerability BugTraq ID: 2128 Remote: No Date Published: 2000-12-18 Relevant URL: http://www.securityfocus.com/bid/2128 Summary: Stunnel is an SSL encryption wrapper by Michal Trojnara. It is available for a number of platforms including FreeBSD, Debian Linux and RedHat Linux. Insecurely-structured calls to syslog() found in certain versions of Stunnel (prior to version 3.9) pass user-supplied data to the syslog() function in such a way that maliciously embedded format specifiers in this data can cause the process to overwrite sections of its own memory with arbitrary data. This user-supplied data is obtained from an identd server of a connecting host. If an attacker controls an ident server, an arbitrary username value containing malicious format specifiers can be sent to Stunnel. This string would then be passed as part of the format string for the syslog() function, where the format specifiers would be interpreted. This can lead to remote access being gained by the attacker on the target host with privileges of Stunnel, which can be required to run as root. Stunnel Weak Encryption Vulnerability BugTraq ID: 2137 Remote: Yes Date Published: 2000-12-19 Relevant URL: http://www.securityfocus.com/bid/2137 Summary: Stunnel is an SSL encryption wrapper by Michal Trojnara. It is available for a number of platforms including Windows, Solaris, FreeBSD, Debian Linux and RedHat Linux. Due to inadequate seeding of the pseudorandom number generator, affected versions (3.8 and earlier) may provide insufficiently robust encryption. The vendor's advisory notes that this only affects versions which run on systems lacking /dev/urandom, including Solaris and Windows. This weakness could allow an attacker to more readily read protected information, which could in turn lead to further compromises of system security. GnuPG Detached Signature Verification False-Positive Vulnerability BugTraq ID: 2141 Remote: No Date Published: 2000-12-20 Relevant URL: http://www.securityfocus.com/bid/2141 Summary: All versions of Gnu Privacy Guard (GnuPG) have a security flaw relating to the proper checking of detached signatures. In certain situations, changes made to signed text detached from its signature file, could be modified by an attacker. This is due to a bug in GnuPG's command-line semantics. When verifying the integrity of a signed document which has its signature in a separate file, Ggnupg can be executed from the command line in the following manner: gpg --verify signature.sig <signed-file.txt The problem with this format, however, is that Gnupg's command-line options used to verify "normal" signed documents is: gpg --verify signed-file.txt If the specified signature file is itself a valid signed document when attempting to verify a document with a detached signature, GnuPG can verify the "signature file" and will not report any errors. Consequently, any modifications to the signed document (with the detached signature) will not be reported because it is not checked as such. For an attacker to exploit this bug, write access to the document's signature file (and signed document to be modified) is required. Korn Shell Redirection Race Condition Vulnerability BugTraq ID: 2148 Remote: No Date Published: 2000-12-21 Relevant URL: http://www.securityfocus.com/bid/2148 Summary: Korn Shell is a widely used, versatile shell distributed with most variants of the UNIX Operating System. A problem exists which could allow local users to append to files owned by other users. The problem occurs in redirection using the << operator. Scripts and command line operations using the << operator insecurely create files in the /tmp directory, creating files with the name tmp.<pid> where pid indicates the process id of the shell. It is possible to create symbolic links in the /tmp directory using the aforementioned file name, which will append the contents of a << request to the file symbolically linked. This design issue makes it possible for a user with malicious intent to corrupt files owned by another user, or potentially append content to other sensitive system files. - Pour poster une annonce: [EMAIL PROTECTED]