[17316] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [RHSA-2000:087-02] Potential security problems in ping fixed.

daemon@ATHENA.MIT.EDU (Ryan W. Maple)
Tue Oct 24 01:30:01 2000

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.10.10010231337290.13983-100000@mastermind.inside.guardiandigital.com>
Date:         Mon, 23 Oct 2000 13:39:07 -0400
Reply-To: "Ryan W. Maple" <ryan@GUARDIANDIGITAL.COM>
From: "Ryan W. Maple" <ryan@GUARDIANDIGITAL.COM>
X-To:         Joseph Gernandez <neo@ERASED.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20001022005417.7353.qmail@securityfocus.com>

On Sun, 22 Oct 2000, Joseph Gernandez wrote:

> Something else to note about the ping bug everyone
> is raving about.. The program does not give a seg
> fault unless run as root, as far as I can see.

<example>

> This was on RedHat 6.2, with the default ping
> package.  Perhaps it's not as big a security problem
> as people have this far thought it was.


This was outlined in Redhat advisory RHSA-2000:087-02, "Potential security
problems in ping fixed.":

<QUOTE>
3. Problem description:

Several problems in ping are fixed:

1) Root privileges are dropped after acquiring a raw socket.
2) An 8 byte overflow of a static buffer "outpack" is prevented.
3) An overflow of a static buffer "buf" is prevented.

A non-exploitable root only segfault is fixed as well.
</QUOTE>


Ryan W. Maple
Guardian Digital, Inc.
ryan@guardiandigital.com

home help back first fref pref prev next nref lref last post