Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 208238 - please apply upstream's patch for acid3 in konqueror
Summary: please apply upstream's patch for acid3 in konqueror
Status: VERIFIED WONTFIX
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: [OLD] KDE (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo KDE team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-01-30 22:26 UTC by Jan Kundrát (RETIRED)
Modified: 2009-08-26 08:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jan Kundrát (RETIRED) gentoo-dev 2008-01-30 22:26:58 UTC
Per upstream's bug http://bugs.kde.org/155451 -- Konqueror crashes when viewing the Acid3 test page. Patch that fixes the issue is at http://websvn.kde.org/?view=rev&revision=761357 .
Comment 1 Wulf Krueger (RETIRED) gentoo-dev 2008-02-09 22:58:29 UTC
KDE 3.5.9 will be tagged in 4 days and released a week later. So this bug will get resolved soon but LATER. :-)
Comment 2 Anton Bolshakov 2008-03-07 14:02:29 UTC
I wondering why you don't want to fix it NOW.
Crash is a serious security vulnerability which might lead to remote (in this case) system compromise. The patch is really simple:
http://websvn.kde.org/branches/KDE/3.5/kdelibs/khtml/ecma/kjs_traversal.cpp?r1=761357&r2=761356&pathrev=761357
IMHO it should be fixed in the current stable version unless KDE 3.5.9 will be tagged as stable in few days. Please review the issue.
Comment 3 Jan Kundrát (RETIRED) gentoo-dev 2008-03-10 08:49:45 UTC
(In reply to comment #2)
> Crash is a serious security vulnerability which might lead to remote (in this
> case) system compromise.

How exactly is a null-pointer dereference a gateway to remote code execution?
Comment 4 Anton Bolshakov 2008-03-10 09:53:43 UTC
I never tried it myself, but a quick search "exploitable null-pointer"
shows that it's possible to control this null pointer under some conditions. For example, http://securityreason.com/securityalert/2286
Since we are not sure, why don't we just fix it?
Comment 5 Anton Bolshakov 2008-03-10 11:27:56 UTC
here is even better reference:
https://www.owasp.org/index.php/Null-pointer_dereference
 Severity
  Medium 
 Likelihood of exploit
  Medium 
Comment 6 Anton Bolshakov 2008-03-10 12:03:39 UTC
Sorry for the spam, but I've found the original paper:

Exploiting the Otherwise Unexploitable
http://uninformed.org/?a=5&t=txt&v=4

Abstract: This paper describes a technique that can be applied in
certain situations to gain arbitrary code execution through software
bugs that would not otherwise be exploitable, such as NULL pointer
dereferences <.. skip ..> in Internet Explorer to gain arbitrary code execution 

The following example shows this proof of concept in action:
msf exploit(windows/browser/ie_unexpfilt_poc) > exploit
[*] Started reverse handler
[*] Using URL: http://x.x.x.x:8080/FnhWjeVOnU8NlbAGAEhjcjzQWh17myEK1Exg0
[*] Server started.
[*] Exploit running as background job.
msf exploit(windows/browser/ie_unexpfilt_poc) >
[*] Sending stage (474 bytes)
[*] Command shell session 1 opened (x.x.x.x:4444 -> y.y.y.y:1059)

msf exploit(windows/browser/ie_unexpfilt_poc) > session -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\mmiller\Desktop>
Comment 7 Jan Kundrát (RETIRED) gentoo-dev 2008-03-10 19:24:12 UTC
(In reply to comment #6)
> Exploiting the Otherwise Unexploitable
> http://uninformed.org/?a=5&amp;t=txt&amp;v=4

..except that null-pointer dereference doesn't generate an exception, but results in immediate termination of the process in question.
Comment 8 Anton Bolshakov 2008-04-19 09:16:16 UTC
A new way of exploiting null-pointer exception has been discovered:
http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/
http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf
Comment 9 Tomáš Chvátal (RETIRED) gentoo-dev 2009-08-09 11:42:57 UTC
bugzie.
Comment 10 Tomáš Chvátal (RETIRED) gentoo-dev 2009-08-09 11:43:19 UTC
No need to patch something to pass syntetic test.
Comment 11 Anton Bolshakov 2009-08-19 02:07:54 UTC
(In reply to comment #10)
> No need to patch something to pass syntetic test.
> 

The summary is not accurate: konqueror crashes during the test which might lead to remote compromise.

(In reply to comment #3)
> How exactly is a null-pointer dereference a gateway to remote code execution?

Well, one year later, here we are:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2692
http://www.milw0rm.com/exploits/9477
It all started from adobe flash null pointer exploit btw.

Do you still want to accept a risk and not to apply a trivial patch?
Since then security patches marked as "wontfix" in Gentoo ???
Comment 12 Jan Kundrát (RETIRED) gentoo-dev 2009-08-26 08:29:15 UTC
> (In reply to comment #3)
> > How exactly is a null-pointer dereference a gateway to remote code execution?
> 
> Well, one year later, here we are:
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2692
> http://www.milw0rm.com/exploits/9477
> It all started from adobe flash null pointer exploit btw.

Right, I stand corrected. Note that NULL pointer dereference in kernel is different than one in userspace, AFAIK.

> Do you still want to accept a risk and not to apply a trivial patch?
> Since then security patches marked as "wontfix" in Gentoo ???

The bug in question was reported against KDE 3.5.8. We have had 3.5.10 for ages, so the bug is fixed.