[9624] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [HERT] Advisory #002 Buffer overflow in lsof

daemon@ATHENA.MIT.EDU (Vic Abell)
Thu Feb 18 11:20:39 1999

Date: 	Thu, 18 Feb 1999 07:10:47 -0500
Reply-To: abe@purdue.edu
From: Vic Abell <abe@PURDUE.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <19990218013035.B4950@red.blood.int>

I would have appreciated the courtesy of an advance notice
that this problem had been discovered.  5 minutes after I
learned of it *third-hand* via DejaNews this patch was
available and announced to the lsof-l mailing list:

ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/patches/4.40/arg.c.patch

Vic Abell <abe@purdue.edu>, lsof author

> -----Original Message-----
> From: Bugtraq List [mailto:BUGTRAQ@netspace.org]On Behalf Of Anthony C .
> Zboralski
> Sent: Wednesday, February 17, 1999 7:31 PM
> To: BUGTRAQ@netspace.org
> Subject: [HERT] Advisory #002 Buffer overflow in lsof
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> - --------------------------------------------------------------
>   HERT - Hacker Emergency Response Team
>   alert@hert.org - http://www.hert.org
>
>   Advisory:        #00002
>   Title:           lsof
>   Date:            17 February 1999
>   Summary:         Buffer overflow in lsof version 4.40 and prior
>   IMPACT:          Local users may obtain root priviledge.
>
>   Author:          Mariusz Tmoggie Marcinkiewicz <tmoggie@hert.org>
>   Test Exploit:    kil3r@hert.org
> - ---------------------------------------------------------------
>
> Copyright (C) 1999 Hacker Emergency Response Team
>
> Permission is granted to reproduce and distribute HERT advisories in their
> entirety, provided the HERT PGP signature is included and provided the alert is used for noncommercial purposes and with
> the intent of increasing the aware-
> ness of the Internet community.
>
> This advisory is distributed in the hope that it will be useful,
> but WITHOUT ANY WARRANTY; without even the implied warranty of
> MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
>
> 1. Background:
>
>    lsof - list open files
>    Lsof lists information about files opened by processes for most
>    UNIX dialects.
>
>    When lsof is setuid-root or setgid kmem, it is vulnerable to a buffer
>    overflow that will lead to direct root compromise or root compromise
>    thru live kernel patching.
>
>    The paradox is that lsof is a great security tool for administrators and
>    we encourage its uses as long as it is NOT setuid-root or setgid.
>
>    Test exploit code for this vulnerability was developped by kil3r@hert.org
>    and will be made available to lsof author, HERT collaborators, sponsors
>    and partners.
>
> 2. Distributions known to be affected.
>
>    OpenBSD 2.4's ports facility retrieves and builds lsof package setgid kmem.
>    FreeBSD's ports facility retrieves and builds lsof package setgid kmem.
>    SuSe Linux ships lsof setgid kmem.
>    Debian GNU/Linux 2.0 ships lsof setgid kmem.
>    Redhat Linux 5.2 ships lsof setgid kmem.
>
> 3. Recommendations
>
>    Fix:
>
>      chmod 0755 lsof
>
> To subscribe to the HERT Alert mailing list, email alert@hert.org
> with subscribe in the body of the message.
>
> Contact hert@hert.org for more information.
> The HERT PGP public key is available at ftp://ftp.hert.org/pub/HERT_PGP.key
>
> To report a vulnerability: http://www.hert.org/vul_reporting_form
>
> We would like to thank the individuals who donates some of their time to HERT.
>
> HERT is a non-profit international organisation based in France.
> If you wish to join the HERT effort please send a note to hert@hert.org.
> - --
> Please respect the privacy of this mailing list.
> To UNSUBSCRIBE, email to hert-private-request@hert.org
> with "unsubscribe" in the body. Trouble? Contact listmaster@hert.org
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3ia
> Charset: latin1
>
> iQCVAwUBNss8D7iV3oeHg1NdAQGHZwP+L76JOU2iHtvl2i3AHP3VDdEJ6W8M5zjf
> vVWDpQY7z4qmW4Ai/D5mnzeRwUey8W9imkoY4J4cF3/O+s/70+rsbwAKsmVgztBm
> DjhdWfMl/yz0ZT8zATJV+YVGtPQsmzvPbZR7YWOQh7oQQyPwzQXkswHkTB24Fsdg
> ehmkQnF1N9c=
> =Ohr4
> -----END PGP SIGNATURE-----
>

home help back first fref pref prev next nref lref last post