[18215] in bugtraq

home help back first fref pref prev next nref lref last post

IRIX 6.5.10m and libX11

daemon@ATHENA.MIT.EDU (Michal Zalewski)
Wed Dec 20 03:00:02 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.21.0012191047180.25669-100000@nimue.tpi.pl>
Date:         Tue, 19 Dec 2000 10:53:07 +0100
Reply-To: Michal Zalewski <lcamtuf@TPI.PL>
From: Michal Zalewski <lcamtuf@TPI.PL>
To: BUGTRAQ@SECURITYFOCUS.COM

libX11 (Xlib) library shipped with IRIXes seems to be vulnerable to the
same vulnerability that affected XFree 3.3.6 some time ago (sun_path
sprintf()) - excessive local part in DISPLAY variable. On big endian
machines it would be generally more difficult to exploit it, because
one-byte fenceposts will affect high byte of every dword. We are limited
by a small subset of accepted characters. For more details, original post
can be found there:

          < http://www.securityfocus.com/archive/1/139436 >

Vendors were informed something around three weeks ago, but I have no
confirmation if it has been fixed yet.

--
_______________________________________________________
Michal Zalewski [lcamtuf@tpi.pl] [tp.internet/security]
[http://lcamtuf.na.export.pl] <=--=> bash$ :(){ :|:&};:
=--=> Did you know that clones never use mirrors? <=--=

home help back first fref pref prev next nref lref last post