lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 2 Jun 2006 08:33:15 -0400
From: Thomas Dickey <dickey@...ix.net>
To: bugtraq@...URITYFOCUS.COM
Subject: Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities

On Thu, Jun 01, 2006 at 10:20:21AM +0200, Martin Schulze wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> - --------------------------------------------------------------------------
> Debian Security Advisory DSA 1085-1                    security@...ian.org
> http://www.debian.org/security/                             Martin Schulze
> June 1st, 2006                          http://www.debian.org/security/faq
> - --------------------------------------------------------------------------
> 
> Package        : lynx-ssl
> Vulnerability  : several
> Problem type   : remote
> Debian-specific: no
> CVE IDs        : CVE-2004-1617 CAN-2005-3120
> BugTraq ID     : 11443
> Debian Bug     : 296340
> 
> 
> Several vulnerabilities have been discoverd in lynx, the popular

"Several" is more than two or three.
But it sounds good in an advisory, even if inaccurate.

> text-mode WWW browser.  The Common Vulnerabilities and Exposures
> Project identifies the following vulnerabilities:
> 
> CVE-2004-1617
> 
>     Michal Zalewski discovered that lynx is not able to grok invalid
>     HTML including a TEXTAREA tag with a large COLS value and a large
>     tag name in an element that is not terminated, and loops forever
>     trying to render the broken HTML.

This is only partly true.  As I noted in the Debian bug report which is
associated with this part of the advisory on the 29th:

    The credits on the advisory are inaccurate.  Quoting from Zalewski's
    original mail:
    >
    >  * lynx_die1.html
    >
    >    Lynx loops forever trying to render broken HTML.

    and your advisory states:

          Michal  Zalewski  discovered  that  lynx,  the  popular  text-mode WWW
          Browser,  is  not  able  to grok invalid HTML including a TEXTAREA tag
          with a large COLS value and a large tag name in an element that is not
          terminated,  and  loops  forever trying to render the broken HTML. The
          same code is present in lynx-ssl.

    Lynx was unaffected by the _broken_ html.  It did not guard against the large
    COLS value.  Zalewski did no analysis, but wrote something that sounded nice(*)
 
Zalewski also stated on a followup that he had notified (as is expected
on this list) the vendors of the related programs.  I'm certain this is
incorrect as well, but that's a different thread.  For this discussion,
it is sufficient to point out that Martin Schulze misattributed a
substantial part of the work which was done, and that (read the bug
report) he was aware that this is incorrect.

> CAN-2005-3120
> 
>     Ulf Härnhammar discovered a buffer overflow that can be remotely
>     exploited. During the handling of Asian characters when connecting
>     to an NNTP server lynx can be tricked to write past the boundary
>     of a buffer which can lead to the execution of arbitrary code.
> 
> For the old stable distribution (woody) these problems have been fixed in
> version 2.8.5-2.5woody1.
> 
> For the stable distribution (sarge) these problems have been fixed in
> version 2.8.6-9sarge1.

Indeed.  I commented on these before, but was ignored.
Perhaps you read BugTraq, since you ignore followups to your bug reports.

> For the unstable distribution (sid) these problems will be fixed soon.

This also is inaccurate.  To recap (and explain the "have been fixed",
Ulf sent me a small patch which truncated the buffer (introducing 
two new problems: incorrect URL and possibly an incomplete character
sequence).  I wrote a better patch which eliminated these problems:

* eliminate fixed-size buffers in HTrjis() and related functions to avoid
  potential buffer overflow in nntp pages (report by Ulf Harnhammar,
  CAN-2005-3120) -TD

Ulf stated also that he was a member of the Debian security team, and
requested that I not release the patch until a regular announcement of
the issue could be made.  At the same time, there was ongoing
coordination with some packagers to back-port the fix (Redhat and Gentoo
come to mind).

However, someone in Debian's security team blundered and released a
package with Ulf's patch.  (Since many people including Ulf inspected my
patch, the reason for this is not apparent).

I pointed that out and was ignored.
 
> We recommend that you upgrade your lynx-cur package.

lynx-cur already has the fix (from last year).

-- 
Thomas E. Dickey
http://invisible-island.net
ftp://invisible-island.net

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ