lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 2 May 2003 15:11:53 EDT
From: Frank da Cruz <fdc@...umbia.edu>
To: frank goossens <frank@...gonet.be>
Subject: Re: from bugtraq: HP-UX 11.0 /usr/bin/kermit (fwd)


> don't know if you have been involved already..
> 
No, this is the first I've seen of it; thanks for sending it along.

On Fri, 2 May 2003 19:49:03 +0300 bt@...fi.lt wrote to
bugtraq@...urityfocus.com:

> Hi!
> 
> There are many buffer overflows in kermit on HP-UX 11.0 . I am sure it is
> vulnerable in other HP-UX versions, too, since "C-Kermit 6.0.192, 6 Sep 96,
> for HP-UX 10.00" is installed in HP-UX 11.0 by default.
> 
These were fixed for C-Kermit 8.0 long ago.  The current release of C-Kermit
is 8.0.209.  As far as I know, HP ships C-Kermit 8.0.200 or later with all
HP-UX 11.xx's.  I suspect anybody who has "C-Kermit 6.0.192, 6 Sep 96, for
HP-UX 10.00" on HP-UX 11.00 or later must have upgraded their HP-UX version
without also upgrading Kermit.  If you have an older version of C-Kermit on
ANY release of HP-UX all the way back to 5.21, you can get the current
release here:

  http://www.columbia.edu/kermit/ckermit.html

> /usr/bin/kermit is setuid to bin and setgrp to daemon, so upon succesfull
> exploitation, local user could get these priviledges.
> 
The setuid/setgid are required for all HP-UX programs that access serial 
ports.

> Example of on simple buffer overflow in kermit :
> $ /usr/bin/kermit -C "ask `perl -e 'print "A" x 120'`"
> Executing /usr/share/lib/kermit/ckermit.ini for UNIX...
> Good Evening.
> Segmentation fault (core dumped)
> 
The syntax for the ASK command requires a variable name after the word ASK.
Anyway, try it in C-Kermit 8.0:

  /usr/bin/kermit -C "ask foo `perl -e 'print "A" x 800'`"

If you increase 800 to some bigger number, the string is properly cut off
at the end of the ASK prompt buffer.

> There are more kermit commands that are unchecked of correct parameter
> length: askq,define, assign, getc. Several of them use the same vulnerable
> function "doask". I am SURE that these are not all vulnerabilities in
> kermit.
> 
A thorough buffer-overflow / memory-leak audit was performed for
C-Kermit 8.0 in early-mid 2000, and it was in public Alpha test before
the end of 2000.

> one more thing (I am not sure if it is exploitable,but anyway):
> [/home/xxxxxxxxxx] C-Kermit>set alarm %:%:%
> Floating point exception (core dumped)
> 
> Solution - take off setuid bits form /usr/bin/kermit.
>  
Solution: use current version.

> In my opinion, patching kermit against these(and maybe many more)
> vulnerabilities is not an option, since source of C-kermit 6.0.192 is
> publicly available, and it is very buggy.
> 
C-Kermit is maintained by the Kermit Project.  Users don't have to "patch"
it.  If you give a HELP command, it says (among other things):

  Type SUPPORT to learn how to get technical support.

Then if you give a SUPPORT command it tells you how to report problems.

> I tried to contact security-alert@...com, but i got error message "Client
> host rejected: Access denied" (spam?).
>
This topic was hashed over three years ago in Linux Bugtraq; C-Kermit 8.0
was released and furnished to HP in 2001.

Frank da Cruz
The Kermit Project
Columbia University
612 West 115th Street
New York NY  10025-7799
USA
Email: fdc@...umbia.edu
http://www.columbia.edu/kermit/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ