Subject: xshisen: buffer overflow when handling GECOS field
Package: xshisen
Version: 1.51-1-1
Severity: important
Tags: security patch

Hello,

I have found a buffer overflow in xshisen. It copies data from a user's GECOS 
field in
/etc/passwd to a char array. In the rather unlikely event where that GECOS 
field is
about 160 bytes long, the char array is overflowed which can be used to get a 
shell with
gid games. I have attached a patch that fixes this problem.

Here is a line from my /etc/passwd file (after wrapping it) that causes this 
bug:

metaur:x:1000:1000:UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUU,,,:/home/metaur:/bin/bash

I have Cc'ed the upstream developer and Naddy who's involved with FreeBSD's 
Ports
Collection. They might also want to check out some earlier buffer overflows in 
xshisen
that Steve Kemp found in 2003:  http://bugs.debian.org/213957

// Ulf Harnhammar for the Debian Security Audit Project
   http://www.debian.org/security/audit/

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages xshisen depends on:
ii  libc6                    2.3.2.ds1-20    GNU C Library: Shared libraries an
ii  libgcc1                  1:3.4.3-6       GCC support library
ii  libstdc++5               1:3.3.5-5       The GNU Standard C++ Library v3
ii  libxaw7                  4.3.0.dfsg.1-10 X Athena widget set library
ii  xlibs                    4.3.0.dfsg.1-10 X Keyboard Extension (XKB) configu

-- no debconf information


-- 
_____________________________________________________________
Web-based SMS services available at http://www.operamail.com.
From your mailbox to local or overseas cell phones.

Powered by Outblaze

Attachment: xshisen.bufoflow.patch
Description: Binary data

Reply via email to