[19018] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SuSe / Debian man package format string vulnerability

daemon@ATHENA.MIT.EDU (Roman Drahtmueller)
Mon Feb 5 19:49:33 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=ISO-8859-1
Message-ID:  <Pine.LNX.4.30.0102052312440.26556-100000@dent.suse.de>
Date:         Mon, 5 Feb 2001 23:17:28 +0100
Reply-To: Roman Drahtmueller <draht@SUSE.DE>
From: Roman Drahtmueller <draht@SUSE.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010204014834.A1351@lin-gen.com>
Content-Transfer-Encoding: 8bit

> > styx@SuxOS-devel:~$ man -l %n%n%n%n
> > man: Segmentation fault
> > styx@SuxOS-devel:~$
> >
> > This was on my Debian 2.2 potato system (It doesn't dump core though).
> Just for the record:
> on a lot of systems (including Debian), 'man' is not suid/sgid anything, and
> this doesn't impose a security problem.
> I don't know about Suse/Redhat/others.

SuSE ships the /usr/bin/man command suid man.

After exploiting the man command format string vulnerability, the attacker
can then replace the /usr/bin/man binary with an own program - since the
man command is supposed to be used frequently (especially for administrators),
this imposes a rather high security risk, which deserves some due respect.

We'll provide update packages shortly.

> Greets,
> 	Robert

Roman.
-- 
 -                                                                      -
| Roman Drahtmüller      <draht@suse.de> //          "Caution: Cape does |
  SuSE GmbH - Security           Phone: //       not enable user to fly."
| Nürnberg, Germany     +49-911-740530 // (Batman Costume warning label) |
 -                                                                      -

home help back first fref pref prev next nref lref last post