Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 196811 - net-proxy/3proxy <= 0.5.3i double free vulnerability
Summary: net-proxy/3proxy <= 0.5.3i double free vulnerability
Status: RESOLVED DUPLICATE of bug 196772
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B1 [upstream] keytoaster
Keywords:
Depends on:
Blocks:
 
Reported: 2007-10-23 17:28 UTC by Tobias Heinlein (RETIRED)
Modified: 2007-10-23 17:33 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tobias Heinlein (RETIRED) gentoo-dev 2007-10-23 17:28:18 UTC
I.Synopsis

A vulnerability has been discovered in 3proxy allowing for the remote
execution of arbitrary code.

There is a double free vulnerability in function ftpprchild().
...
if (!strncasecmp((char *)buf, "OPEN ", 5)){
	if(param->hostname) myfree(param->hostname); <--first free
	if(parsehostname((char *)buf+5, param, 21)){RETURN(803);}

the parsehostname will free param->hostname again.
int parsehostname(char *hostname, struct clientparam *param, unsigned
short port){
		char *sp;
	
		if(!hostname || !*hostname)return 1;
		if ( (sp = strchr(hostname, ':')) ) *sp = 0;
		if(param->hostname) myfree(param->hostname); <-- double free


Impact
A remote attacker could send a specially crafted transparent request to
the proxy, resulting in the execution of arbitrary code with privileges
of the user running 3proxy.

Credit:
Venustech AD-LAB discovery this vuln. Thank to all Venustech AD-Lab
guys.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2007-10-23 17:33:05 UTC
Something's weird here, I'm absolutely sure there was no existing report about this issue when I searched for it 3 seconds ago..

*** This bug has been marked as a duplicate of bug 196772 ***