|
|
Message-ID: <132809582.23179823.1371802188478.JavaMail.root@redhat.com>
Date: Fri, 21 Jun 2013 04:09:48 -0400 (EDT)
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>,
Axel Beckert <abe@...ian.org>, Nico Golde <nion@...ian.org>,
"W. Martin Borgert" <debacle@...ian.org>
Subject: CVE Request -- tpp: Possibility of arbitrary code execution when
processing untrusted TPP template
Hello Kurt, Steve, vendors,
A security flaw was found in the way tpp, a ncurses-based presentation tool,
processed TPP templates containing --exec clause (input provided as an argument
of the --exec clause would be immediately executed without requesting a second
confirmation from the user). A remote attacker could provide a specially-crafted
text presentation program (TPP) template that, when processed with the tpp binary
would lead to arbitrary code execution with the privileges of the user running
the tpp executable.
References:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644
[2] http://patch-tracker.debian.org/patch/series/view/tpp/1.3.1-3/15-optional-exec.patch
(Debian distribution patch)
[3] https://bugzilla.redhat.com/show_bug.cgi?id=976684
Upstream patch / GitHub link:
[4] https://github.com/xtaran/tpp/commit/350aafbd9a3256f6d479dacb9740bf3f0b9a3fc3
Could you allocate a CVE id for this?
Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.