Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0901272033410.25454@faron.mitre.org>
Date: Tue, 27 Jan 2009 21:38:06 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request -- Python < 2.6 PySys_SetArgv issues
 (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)


On Mon, 26 Jan 2009, Jan Lieskovsky wrote:

> Though this is a Python flaw (insertion of cwd at the
> beginning of the Python modules search path), according to our Python
> maintainers it can't be fixed on Python's side due the need
> of ensuring the work of other numerous packages, when loading
> Python modules.

This was a bit of a pain CVE-wise, though  I suspect it was less painful
than what the maintainers are going through.

It seems fair to label the Python bug separately as an instance of
CWE-684: Failure to Provide Specified Functionality (or some other "API
Abuse CWE-227 problem).  Then we could assign separate CVE's for the
others ("failure to work around a known issue in the underlying
interpreter").  I'm always worried about these kinds of things producing
mass amounts of CVE's, and it doesn't seem fair to those applications -
but given that Python upstream can't/won't fix the issue, this seems the
best approach, since the apps will have to be patched themselves.

Do you have any upstream bug ID's for the Python bug itself, or some
Python mailing list?  I'd like to capture that issue there, if possible.

I'm using CVE-2008-5983 to help track the Python bug itself.

For the individual apps:

CVE-2008-5984 - Dia
CVE-2008-5985 - Epiphany
CVE-2008-5986 - Csound
CVE-2008-5987 - eog

They all had 2008 CVE's because of James Vega's work in November, which
was "technically public" at that time.

The following ones are 2009 because the first disclosure seems to be from
Jan in the original oss-security post.

Does anybody have upstream version information for these?  They aren't in
the Red Hat bug reports, so the descriptions have no versions.

CVE-2009-0314 - gedit
CVE-2009-0315 - xchat
CVE-2009-0316 - vim
CVE-2009-0317 - Nautilus
CVE-2009-0318 - Gnumeric


- Steve

======================================================
Name: CVE-2008-5983
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983
Reference: MLIST:[debian-bugs] 20081112 Bug#493937: [Patch] Prevent loading of Python modules in working directory
Reference: URL:http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg586010.html
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: MLIST:[debian-bugs-rc] 20080805 Bug#484305: bicyclerepair: bike.vim imports untrusted python files from cwd
Reference: URL:http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html

Untrusted search path vulnerability in the PySys_SetArgv API function
in Python before 2.6 prepends an empty string to sys.path when the
argv[0] argument does not contain a path separator, which might allow
local users to execute arbitrary code via a Trojan horse Python file
in the current working directory.


======================================================
Name: CVE-2008-5984
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5984
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481551
Reference: BID:33448
Reference: URL:http://www.securityfocus.com/bid/33448
Reference: SECUNIA:33672
Reference: URL:http://secunia.com/advisories/33672
Reference: XF:dia-pysyssetargv-privilege-escalation(48262)
Reference: URL:http://xforce.iss.net/xforce/xfdb/48262

Untrusted search path vulnerability in the Python plugin in Dia
0.96.1, and possibly other versions, allows local users to execute
arbitrary code via a Trojan horse Python file in the current working
directory, related to a vulnerability in the PySys_SetArgv function
(CVE-2008-5983).


======================================================
Name: CVE-2008-5985
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481548

Untrusted search path vulnerability in the Python interface in
Epiphany 2.22.3, and possibly other versions, allows local users to
execute arbitrary code via a Trojan horse Python file in the current
working directory, related to a vulnerability in the PySys_SetArgv
function (CVE-2008-5983).


======================================================
Name: CVE-2008-5986
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5986
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481550

Untrusted search path vulnerability in the (1) "VST plugin with Python
scripting" and (2) "VST plugin for writing score generators in Python"
in Csound 5.08.2, and possibly other versions, allows local users to
execute arbitrary code via a Trojan horse Python file in the current
working directory, related to a vulnerability in the PySys_SetArgv
function (CVE-2008-5983).


======================================================
Name: CVE-2008-5987
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5987
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504352
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481553

Untrusted search path vulnerability in the Python interface in eog
2.22.3, and possibly other versions, allows local users to execute
arbitrary code via a Trojan horse Python file in the current working
directory, related to a vulnerability in the PySys_SetArgv function
(CVE-2008-5983).


======================================================
Name: CVE-2009-0314
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0314
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: MISC:http://bugzilla.gnome.org/show_bug.cgi?id=569214
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481556

Untrusted search path vulnerability in the Python module in gedit
allows local users to execute arbitrary code via a Trojan horse Python
file in the current working directory, related to a vulnerability in
the PySys_SetArgv function (CVE-2008-5983).


======================================================
Name: CVE-2009-0315
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0315
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481560

Untrusted search path vulnerability in the Python module in xchat
allows local users to execute arbitrary code via a Trojan horse Python
file in the current working directory, related to a vulnerability in
the PySys_SetArgv function (CVE-2008-5983).


======================================================
Name: CVE-2009-0316
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316
Reference: MLIST:[debian-bugs-rc] 20080805 Bug#484305: bicyclerepair: bike.vim imports untrusted python files from cwd
Reference: URL:http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481565

Untrusted search path vulnerability in the Python module in vim allows
local users to execute arbitrary code via a Trojan horse Python file
in the current working directory, related to a vulnerability in the
PySys_SetArgv function (CVE-2008-5983).


======================================================
Name: CVE-2009-0317
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0317
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481570

Untrusted search path vulnerability in the Python language bindings
for Nautilus (nautilus-python) allows local users to execute arbitrary
code via a Trojan horse Python file in the current working directory,
related to a vulnerability in the PySys_SetArgv function
(CVE-2008-5983).


======================================================
Name: CVE-2009-0318
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318
Reference: MLIST:[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/26/2
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=481572

Untrusted search path vulnerability in the GObject Python interpreter
wrapper in Gnumeric allows local users to execute arbitrary code via a
Trojan horse Python file in the current working directory, related to
a vulnerability in the PySys_SetArgv function (CVE-2008-5983).


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.