Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: FreeBSD Security Advisory: FreeBSD-SA-00:62.top [REISSUED]
From: Kris Kennaway <kris () FREEBSD ORG>
Date: Tue, 7 Nov 2000 11:35:58 -0800

On Tue, Nov 07, 2000 at 01:12:56PM +1100, vort-fu wrote:

From my initial findings, this was not exploitable (not easily if at all),
as the command input is restricted in length, 50 bytes from memory. No
supplied addresses can be accessed nor any that could be used to
easily modify the ret of a call.

Oh well, better to be safe than sorry. There have been more unlikely
situations exploited than this one, so who knows.

NOTE: The original version of this advisory contained an incomplete
patch which does not fully eliminate the security vulnerability. The
additional vulnerability was pointed out by Przemyslaw Frasunek
<venglin () freebsd lublin pl>.

It seems that somebody from the freebsd team didnt copy and paste well
enough from my openbsd patch, but the missing segment in the original
fbsd patch was only added for 'completeness' on my behalf.

The error lied in the kill command alone, the renice command was
unaffected, thus the updated patch is not necessarily needed.

Ditto.

Personally I would put this down to a programming error, and not an
(exploitable) vulnerability. Though I admit that I am not an overly
superkraduberleet(tm) exploit coder, and dont pretend to be, but if anyone
can exploit this bug, please forward to the list.

ps. This was sent to the openbsd team, and patched, a month or so ago. How
can the freebsd team justify the lateness in applying their patch
(especially considering that they felt it was exploitable)?

Easy, it wasn't sent to us (FreeBSD Security Officer). Some of us also
have other things in our life apart from computers and slavishly
following OpenBSD mailing lists.

Kris

Attachment: _bin
Description:


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault