Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51BB76DA.2000307@redhat.com>
Date: Fri, 14 Jun 2013 14:02:34 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Felipe Pena <felipensp@...il.com>
Subject: Re: CVE request: FD leakage for cgi program on Monkey
 HTTPD

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/14/2013 11:24 AM, Felipe Pena wrote:
> I've identified a fd leakage when running a program via Monkey
> HTTPD - CGI plugin.
> 
> By runninng `ls -lah /proc/<pid>/fd/` on the CGI program we can
> see:
> 
> total 0 dr-x------ 2 felipe felipe 0 Jun 14 14:00 . dr-xr-xr-x 8
> felipe felipe 0 Jun 14 14:00 .. lr-x------ 1 felipe felipe 64 Jun
> 14 14:00 0 -> pipe:[239545] l-wx------ 1 felipe felipe 64 Jun 14
> 14:00 1 -> pipe:[239546] lrwx------ 1 felipe felipe 64 Jun 14 14:00
> 10 -> anon_inode:[eventpoll] lr-x------ 1 felipe felipe 64 Jun 14
> 14:00 11 -> pipe:[242960] lrwx------ 1 felipe felipe 64 Jun 14
> 14:00 12 -> anon_inode:[eventpoll] lrwx------ 1 felipe felipe 64
> Jun 14 14:00 13 -> anon_inode:[eventpoll] lrwx------ 1 felipe
> felipe 64 Jun 14 14:00 14 -> anon_inode:[eventpoll] lrwx------ 1
> felipe felipe 64 Jun 14 14:00 15 -> anon_inode:[eventpoll] 
> lrwx------ 1 felipe felipe 64 Jun 14 14:00 16 ->
> anon_inode:[eventpoll] lrwx------ 1 felipe felipe 64 Jun 14 14:00
> 17 -> anon_inode:[eventpoll] lrwx------ 1 felipe felipe 64 Jun 14
> 14:00 18 -> anon_inode:[eventpoll] lrwx------ 1 felipe felipe 64
> Jun 14 14:00 19 -> anon_inode:[eventpoll] l-wx------ 1 felipe
> felipe 64 Jun 14 14:00 2 -> /dev/null lrwx------ 1 felipe felipe 64
> Jun 14 14:00 3 -> socket:[240797] lrwx------ 1 felipe felipe 64 Jun
> 14 14:00 4 -> 
> /home/felipe/audit/monkey/monkey/logs/monkey.pid.2001 lr-x------ 1
> felipe felipe 64 Jun 14 14:00 5 -> pipe:[240798] l-wx------ 1
> felipe felipe 64 Jun 14 14:00 6 -> pipe:[240798] lr-x------ 1
> felipe felipe 64 Jun 14 14:00 7 -> pipe:[240799] l-wx------ 1
> felipe felipe 64 Jun 14 14:00 8 -> pipe:[240799] lrwx------ 1
> felipe felipe 64 Jun 14 14:00 9 -> socket:[242784]
> 
> Hence a malicious program can take control of Monkey HTTP request
> response through a network socket related file descriptor, etc.
> 
> 
> Report ------ http://bugs.monkey-project.com/ticket/187
> 
> 
> CREDITS ------- Felipe Pena
> 
> -- Regards, Felipe Pena
> 

Please use CVE-2013-2183 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=UYLs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.