|
Message-ID: <4E325959.1060008@free.fr> Date: Fri, 29 Jul 2011 08:55:21 +0200 From: miniupnp <miniupnp@...e.fr> To: Kees Cook <kees@...ntu.com> CC: oss-security@...ts.openwall.com Subject: Re: multiple flaws in minissdpd Thanks for the report, I'm having a look at theses issues. Le 28/07/2011 23:24, Kees Cook a écrit : > Hi! > > I recently did an audit[1] of minissdpd for Ubuntu, and found a lot of issues, > unfortunately. There may be more hiding that I didn't notice, but here > are the security bits of my notes: > > > Denial of Service: > > - off-by-one in packet parsing can trigger crashes on unluckily alignment > minissdpd.c line ~290 > > - walk off end of memory without length check in "cache-control" packet > minissdpd.c line ~314 > > - some unchecked malloc uses could lead to crash > > - does not clean up /var/run files on crash > > > Corruption, possible manipulation of responses: > > - linefeed injection in service requests > > - unchecked write lengths (could get interrupted, lead to corruption) > > > Memory corruption, with execution control likely: > > - multiple buffer overflows in processRequest > - unchecked decoded lengths > - unchecked buffer creation length > - integer overflows in decoded lengths > - write null byte arbitrarily in heap > - could read stack memory out on requests (including canary if OS > used stack protector canary that wasn't null-started). e.g.: > - add bogus service with giant coded-length "location" entry > - read back with type==1 and matching "st" > > > General Safety: > > - does not drop privileges > > > Hopefully all of this can get fixed up, it looks like a useful service. :) > > Thanks, > > -Kees > > [1] https://bugs.launchpad.net/ubuntu/+source/minissdpd/+bug/813313 > >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.