[11723] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Babcia Padlina Ltd. security advisory: mars_nwe bu

daemon@ATHENA.MIT.EDU (Przemyslaw Frasunek)
Tue Sep 7 19:48:41 1999

Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7BIT
Mime-Version: 1.0
Message-Id:  <XFMail.990903182700.venglin@FreeBSD.lublin.pl>
Date:         Fri, 3 Sep 1999 18:27:00 +0200
Reply-To: Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
From: Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
X-To:         Taneli Huuskonen <huuskone@cc.helsinki.fi>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <199909020221.FAA10060@sirppi.helsinki.fi>

-----BEGIN PGP SIGNED MESSAGE-----

On 02-Sep-99 Taneli Huuskonen wrote:

> +  snprintf(command, sizeof(command)-1, "mv %s %s 2>&1 >/dev/null" , oldname,
> newname);
>    return(system(command));
>  }
>
> Without seeing the context, I can't say for sure, but this looks like a
> hole big enough to drive a truck through  -  calling system( ) with
> user-supplied arguments.  If this code is running with superuser
> privileges and shell metacharacters haven't been removed very carefully,
> there's going to be a trivial exploit.

oh, i've looked at the code and function that contains that system() isn't ever
used. :)

- ---
* Fido: 2:480/124 ** WWW: FreeBSD.lublin.pl/~venglin ** GSM: +48-601-383657 *
* Inet: venglin@FreeBSD.lublin.pl ** PGP: D48684904685DF43 EA93AFA13BE170BF *

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBN8/209O5/yfsePq1AQHydQQAjQP1B1/Y5n11dSP3KreHlchiCOmuFPDC
3/SA+nTMrKBidcO/j37Mm/3biy9SkDmSSnn+EdKZwuCMH8BZ4CUrp6CdQzPwBJ8r
oJxcotzFHf3D/ojhhC89PsGfIGJ+L1QJiOuTLFltlJU1eOis8VhIQclT+0eNWVhM
g1sgF/mJaXE=
=SDuc
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post