|
Message-ID: <DUB111-W4861089C4AAB5A5CD3A200EF630@phx.gbl> Date: Fri, 19 Jul 2013 05:22:52 +0430 From: Hamid Zamani <me@...idx9.ir> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE Request : Radius Daemon (YardRadius v1.1.2-4 ) Multiple Format String Vulnerabilities Hello, Software name : YardRadius Version : 1.1.2-4 Several Format String Vulnerabilites was found in latest YardRadius . Description : src/log.c : void log_msg(int priority,char *fmt, va_list args) { ... char buffer[1024]; ... vfprintf(msgfd, fmt, args); ... vsnprintf(buffer,1024,fmt, args); #if defined(HAVE_SYSLOG) syslog(priority, buffer); //! if buff filled by "%x" so an attacker can see the addresses and ... ... vsyslog(priority, fmt, args); ... } ############ src/version.c : #define STRVER "%s : YARD Radius Server %s ... $ " void version(void) { char buffer[1024]; build_version(buffer,sizeof(buffer)); fprintf(stderr, buffer); exit(-1); } ... void build_version(char *bp,size_t sizeofbp) { snprintf(bp,sizeofbp-1,STRVER, progname, VERSION); .. $ ln -s radiusd %x $ ./%x -v ./b77c0ff4 : YARD Radius Server 1.1 ... So an attacker may control the memory and execute arbitrary codes. Debian bug report : http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714612 CXSecurity.com : http://cxsecurity.com/issue/WLB-2013070028 Please assign a CVE number. Thank you, Hamid Zamani
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.