[6844] in bugtraq

home help back first fref pref prev next nref lref last post

Re: HP-UX finger possible security hole

daemon@ATHENA.MIT.EDU (Walter Misar)
Thu May 28 14:05:10 1998

Date: 	Wed, 27 May 1998 08:45:22 +0200
Reply-To: Walter Misar <misar@RBG.INFORMATIK.TU-DARMSTADT.DE>
From: Walter Misar <misar@RBG.INFORMATIK.TU-DARMSTADT.DE>
To: BUGTRAQ@NETSPACE.ORG

> while i was playing with the finger command, i got a coredump when
> i submit
>
> finger aaaa ( 200 random caracters )
>
> i wonder if this is a possible security hole because the finger
> command is owned by bin group.

The situation is far worse, if fingerd is run (which invokes finger).

> my HP-UX is A.09.05 A 9000/73
>
> sorry if this is an old bug i didn t had the time to check the archive
> and forgive me for my broken english :)

When I first noticed this some years ago, I didn't find anything about it
in any archives. But the hole should prove hard to exploit anyway - at least
for the m68k hpux version, the overflow was in the malloc() area - it cores
after a second call to malloc(). So standard techniques won't apply, but
it should be possible to direct the write to the second malloced() area to
any memory location.

        Walter

home help back first fref pref prev next nref lref last post