|
Message-ID: <20090317214102.GN19038@ngolde.de>
Date: Tue, 17 Mar 2009 22:41:02 +0100
From: Nico Golde <oss-security+ml@...lde.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2009-0876 (VirtualBox) references
Hi,
* Steven M. Christey <coley@...us.mitre.org> [2009-03-17 21:54]:
> On Tue, 17 Mar 2009, Nico Golde wrote:
> > Any reason the CVE description says "Unspecified
> > vulnerability...via unknown vectors"?
>
> This was based on the original Sun alert. I cleaned up the description
> yesterday, and the CVE web site was updated today.
Ok
> > Looking at the Gentoo bug report[0] it seems obvious to me
> > that this is caused by insecurely loading shared libraries
> > so you can inject your own shared lib code.
> >
> > [0] https://bugs.gentoo.org/show_bug.cgi?id=260331#c0
>
> It wasn't particularly obvious to me. I may be getting hung up on the use
> of hardlinks.
>
> Is the problem that the executable includes a "." in its library path
> (presumably DT_RPATH), and that path isn't cleansed until later during
> program execution? If it's just that, then the use of a hardlink doesn't
> seem to be essential - the attacker could run the program from their own
> directory. Or, is it that the executable eventually removes "." from its
> path, but not before some libraries have already been loaded?
From what I understood the last one is true but I am also
not 100% sure as the information about this is really rare.
The current (updated) version of the description however
looks fine to me.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - nion@...ber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.