Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 204070 - games-emulation/dosbox - access to filesystem form within the emulator
Summary: games-emulation/dosbox - access to filesystem form within the emulator
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-01-02 16:07 UTC by Carsten Lohrke (RETIRED)
Modified: 2008-01-05 18:31 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2008-01-02 16:07:27 UTC
http://aluigi.altervista.org/adv/dosboxxx-adv.txt

I would't dismiss this issue so lightly as the authors of dosbox. Doing mount c: ~/ and then going on killing the user data from within a malicious dos application or batch file is a very simple task. At the very least a post install warning is in order, imho.
Comment 1 Mr. Bones. (RETIRED) gentoo-dev 2008-01-02 16:15:19 UTC
this isn't a security issue.
Comment 2 Carsten Lohrke (RETIRED) gentoo-dev 2008-01-02 16:25:00 UTC
When applications can freely modify data outside of the emulator, it is a security issue.
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-01-02 17:35:18 UTC
CVE-2007-6328 (** DISPUTED ** ...)
        NOTE: DOSBox emulation is not a security feature and this CVE describes
        NOTE: a design decision.

What's the difference between this and starting any other process with a user's privileges? I don't consider this to be an issue, and seeing that upstream will not provide patches, I also would not know how to patch it, except for deviating from their code.
Comment 4 Lubomir Rintel 2008-01-02 18:30:45 UTC
This is a feature, not a bug.
Fedora is not going to consider this a security issue either.
Comment 5 Carsten Lohrke (RETIRED) gentoo-dev 2008-01-02 18:48:54 UTC
(In reply to comment #3)
> What's the difference between this and starting any other process with a user's
> privileges?

The difference is that you expect an emulator (or virtual machine) to be a closed box, guarding the host from anything run inside of it, configured allowed access excepted.
Comment 6 Lubomir Rintel 2008-01-02 20:18:56 UTC
(In reply to comment #5)
> (In reply to comment #3)
> > What's the difference between this and starting any other process with a user's
> > privileges?
> 
> The difference is that you expect an emulator (or virtual machine) to be a
> closed box, guarding the host from anything run inside of it, configured
> allowed access excepted.

Not actually. You can't really expect a virtual machine to allow only explicitly configured access to outside resources -- this applies only to a subset of virtual machines.

What decides it what is documented.

This behavior of DOSBox is the first thing documented at the beginning of the README and described on the screen once you launch it.

I really can't imagine a kind of person that would expect dosbox to disallow access to host filesystem as it's the only way can dosbox access the programs that are expected to run and is absolutely needed to do even the most basic tasks in dosbox.
Comment 7 Santiago M. Mola (RETIRED) gentoo-dev 2008-01-03 01:58:48 UTC
On the Gentoo side: adding a little warning about that wouldn't hurt. Some users may not realize that a program executed into dosbox may mount directories and have access to any directory outside the one they specified when launching dosbox.

On the upstream side: IMO dosbox should have a secure mode restricting the use of mount and others dangerous commands if any.

Anyway, I don't think this is such a security problem.
Comment 8 Robert Buchholz (RETIRED) gentoo-dev 2008-01-05 03:32:07 UTC
(In reply to comment #7)
> On the Gentoo side: adding a little warning about that wouldn't hurt. Some
> users may not realize that a program executed into dosbox may mount directories
> and have access to any directory outside the one they specified when launching
> dosbox.

Games, can you include the warning so this bug can be closed?
Comment 9 Mr. Bones. (RETIRED) gentoo-dev 2008-01-05 03:53:45 UTC
No thanks.  It's a feature of dosbox.  Please just go ahead and close this bug.  It's based on wrong understanding in the first place.  There's nothing to see here.
Comment 10 Robert Buchholz (RETIRED) gentoo-dev 2008-01-05 18:31:51 UTC
And who doesn't like "features"? -- closing