[32119] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Gaim festival plugin exploit

daemon@ATHENA.MIT.EDU (Randal L. Schwartz)
Mon Oct 20 17:15:37 2003

To: HCTITS Security Division <security@humancentrictech.com>
Cc: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
From: merlyn@stonehenge.com (Randal L. Schwartz)
Date: 20 Oct 2003 11:09:50 -0700
In-Reply-To: <1066439106.3150.6.camel@skillz>
Message-ID: <868ynfn5ld.fsf@blue.stonehenge.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

>>>>> "HCTITS" == HCTITS Security Division <security@humancentrictech.com> writes:

HCTITS> DUH... would help if I attached my attachment.

Is this is repeat?  I'm going to repeat myself then.

YOUR FIX DOES NOT HELP.  Please use my posted fix.

>> system("echo \"$string\" | /usr/bin/festival --tts");

Replace this with

        open FEST, "|/usr/bin/festival --tts";
        print FEST $string, "\n";
        close FEST;

No shells involved.  Only DOS exploits and maybe the usual
C-language overflows in festival itself.

-- 
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!

home help back first fref pref prev next nref lref last post