Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 72371 - buffer overflow in net-p2p/opendchub 0.7.14
Summary: buffer overflow in net-p2p/opendchub 0.7.14
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: C2 [glsa] lewk
Keywords:
Depends on:
Blocks:
 
Reported: 2004-11-24 10:35 UTC by JG
Modified: 2004-11-28 12:12 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
0.7.14-overflow.patch (0.7.14-overflow.patch,405 bytes, patch)
2004-11-24 10:47 UTC, Luke Macken (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description JG 2004-11-24 10:35:58 UTC
http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1115.html

quote:
------------
2. The bug:
------------

The program doesn't correctly manage the $RedirectAll command.
In fact it will have a buffer overflow, letting an attacker to execute
arbitrary code on the victim system.

NOTE: To exploit the bug the attacker needs to have admin privilege on
the victim hub."

test poc:
http://www.autistici.org/fdonato/poc/OpenDcHub[0714]BOF-poc.zip
(kills the opendchub process)

there's no vendor fix yet, but a patch on the fd-list.

JG


Reproducible: Always
Steps to Reproduce:
Comment 1 Luke Macken (RETIRED) gentoo-dev 2004-11-24 10:47:42 UTC
Created attachment 44651 [details, diff]
0.7.14-overflow.patch

Patch by Donato Ferrante from Full-Disclosure.
Comment 2 Luke Macken (RETIRED) gentoo-dev 2004-11-24 10:48:58 UTC
net-p2p,

please verify/apply patch.
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2004-11-26 02:56:40 UTC
Well this should probably be a C2, cause it would allow a remote user to execute arbitrary code. Admin privileges shouldn't usually be given to really untrusted users though, since that allows configuring/stopping/... the hub, nevertheless admin privileges can be given to users without shell access of course.
There does not seem to be a default user for running opendchubs on gentoo btw.

see also <http://securitytracker.com/alerts/2004/Nov/1012323.html>
Comment 4 Jon Hood (RETIRED) gentoo-dev 2004-11-27 08:00:14 UTC
bug confirmed/patched/committed/stable in portage
Comment 5 Luke Macken (RETIRED) gentoo-dev 2004-11-27 19:52:27 UTC
GLSA drafted; security, please review.
Comment 6 Luke Macken (RETIRED) gentoo-dev 2004-11-28 12:12:48 UTC
GLSA 200411-37