[3124] in bugtraq

home help back first fref pref prev next nref lref last post

Possible bufferoverflow condition in lpr, xterm and xload

daemon@ATHENA.MIT.EDU (bloodmask)
Tue Aug 13 02:36:24 1996

Date: 	Tue, 13 Aug 1996 07:27:56 +0200
Reply-To: Bugtraq List <BUGTRAQ@netspace.org>
From: bloodmask <bloodmask@mymail.com>
X-To:         bugtraq@crimelab.com
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>

Greetings,

Quite surprised by mount's lack of boundry checking (After all, it's
been with linux for years) I woke up and started running a simple check
up on all the other suid binaries on popular Linux distributions.
Anyway, Linux users, be very very afraid, it seems mount isn't alone.
Not by a long shot. It seems other binaries on linux and probably on
most unix platforms fail to preform this type of simple checkup on the
size of command line argument / enviorment variables as in relation to
internal buffer size. The check i ran was simple, I coded a command line
buffer overflow scanner, which simply attempted to overwrite the stack
of all the suid binaries on my system. Suspicious and probably
exploitable behavior was a segment of the binary apon execution, with
scanner's command line supplied. My midterm results:

suspicious behavior in lpr [hoho, this is a quite common suid root
binary, in many commercail and non-commercail versions of unix], lpr
exhibited the same behavior as mount, by segmenting when supplied with
an argument above 1024 bytes.

xterm, xload, both segmented when supplied with -display commandline
argument / enviroment variable above it's buffer size. Probably
exploitable, although i haven't gotten around to veryfing this myself,
I'd like to here comments concerning this suspicioun of mine.

Err... love to here any comments...

C'ya folks

home help back first fref pref prev next nref lref last post