Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20080328142752.GA26532@pcpool00.mathematik.uni-freiburg.de>
Date: Fri, 28 Mar 2008 15:27:52 +0100
From: "Bernhard R. Link" <brlink@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: request CVE id: insecure handling of DISPLAY in rxvt

* Robert Buchholz <rbu@...too.org> [080327 03:30]:
> The same issue also exists in:
> aterm, tested 1.0.1
> mrxvt, tested 0.5.3
> multi-aterm, tested 0.2.1
> rxvt-unicode, tested 8.3 and 8.9
> wterm, tested with 6.2.9

These seem all to be rxvt forks. (At least aterm and wterm are, I'm
judging the rest by their names).

> eterm, tested 0.9.4

That seems to be an independent buggy implementation.
(I've sent a patch to the Debian bts at http://bugs.debian.org/473127)

> This is almost half of the terminal emulators I tried. There are
> probably tons of other X applications doing this, not all with the
> impact of a shell, but many allow starting other programs one way or
> another.

I'm really quite suprised to see this, as an application has to
actually do something to end up having this problem.

> Reading the attack vector, I would consider it a vulnerability, but
> looking at the amount of programs that fall into this category, I'm
> worried how many programs do this and if the low impact is really worth
> fixing all of them.

Clicking fast enough to enter some commands is not that easy, and not every
program will allow direct entering of commands, so I guess are most
programs are only usability problems (you get to wait 3 to 10 seconds
before you get an error message when by mistake starting it via an ssh
without -X), and a malicious fake X server would most likely be prepared
for every single program (to reject unexploitable programe early so it
is not noticed, and to send the keyboard events to the right window), so
most programs might not be that much of a problem.

On the other hand, having so many different terminals with almost
identical source might make it even easier to write one exploit that
can cope with all of them.

Hochachtungsvoll,
	Bernhard R. Link

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.