|
Message-ID: <Pine.GSO.4.51.0911091900020.4011@faron.mitre.org> Date: Mon, 9 Nov 2009 19:01:40 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: oping allows the disclosure of arbitrary file contents On Sat, 17 Oct 2009, yersinia wrote: > On Fri, Oct 16, 2009 at 10:06 PM, Josh Bressers <bressers@...hat.com> wrote: > > ----- "Julien Tinnes" <julien.tinnes@...il.com> wrote: > > > > [snip] > > > > I took a look in the oping source. Without another security flaw, this is just > > a bug, oping doesn't do anything while still root that could be an issue. I > > agree that it should be fixed, it is a serious bug, but an attacker cannot do > > anything nefarious with this flaw. > I think that the upstream mantainer should be have the last word > http://verplant.org/liboping/ This says: 2009-09-29 Version 1.3.3 is available. The new release fixes a serious security issue in oping: If the application is installed with the SetUID-bit, anybody on the system could use oping to read arbitrary files using the "-f" option. So as stated, this sounds worthy of a CVE to me. Thoughts? - Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.