[25956] in bugtraq

home help back first fref pref prev next nref lref last post

Formatstring Vulnerability in decfingerd 0.7

daemon@ATHENA.MIT.EDU (isox)
Wed Jun 26 22:43:47 2002

Message-Id: <5.1.1.6.2.20020625030621.00b39a38@localhost>
Date: Tue, 25 Jun 2002 03:12:27 -0700
To: vuln-dev@securityfocus.com, bugtraq@securityfocus.com
From: isox <isox@chainsawbeer.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

Hello all,

I have no idea if this is the most current version of this application, I 
found it while browsing packetstormsecurity earlier.  For all I know it may 
not even be kept current anymore.

Anyhow... bad call to syslog() is the culprit.  I'm to lazy to code an 
exploit for this at the moment but it should be fairly trivial to do if 
anyone is interested in the task:


Culprit code: decfingerd.c

int main(void):
         char input[20], message[100];


         fgets(input, sizeof(input), stdin);

         sprintf(message, "Client %s requested info for %s\n", remoteIP, 
input);
         syslog(0, message, sizeof(message));



Have a good one,
isox

---
- isox@chainsawbeer.com
- http://0xc0ffee.com
---


home help back first fref pref prev next nref lref last post