Home page logo

oss-sec logo oss-sec mailing list archives

Re: CVE request: perf: may parse user-controlled config file
From: Steve Grubb <sgrubb () redhat com>
Date: Wed, 10 Aug 2011 09:47:26 -0400

On Tuesday, August 09, 2011 09:25:24 AM Yves-Alexis Perez wrote:
On mar., 2011-08-09 at 09:18 -0400, Steve Grubb wrote:
And in recent kernels has an executable stack:

We don't have access to that bug.

Its marked as a security bug and I guess its not been reclassified. The short of it is 

/usr/bin/eu-readelf -l /usr/bin/perf  | grep STACK

If you get RWE for the permissions, its executable. If you get RW, then everything is 
fine. While this itself is not exploitable, if there were any other problems then this 
could be susceptible to putting shell code on the stack which should have been 
banished long ago. IOW, the ease of exploit goes up since you don't need to defeat any 
advanced security mechanisms like ASLR.

I have a number of security assessment utilities located here:
that can scan systems looking for problems like this. Some are rpm centric because 
once you find a problem you want to know the associated package, but they could be 
easily modified for other packaging tools.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]