lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: flatline at blackhat.nl (flatline)
Subject: format strings vulns in /bin/login and
  /usr/bin/passwd

At 08:13 AM 26-01-2003 +0000, you wrote:

>Hello while doing a scan for format strings vulns on util-linux package it 
>came back with the following results.
>
>./login.c:398 FUNC fprintf
>./login.c:425 FUNC fprintf
>./login.c:597 FUNC fprintf
>./login.c:614 FUNC fprintf
>./login.c:775 FUNC printf
>./login.c:796 FUNC fprintf
>./login.c:800 FUNC fprintf
>./login.c:1109 FUNC syslog
>./login.c:1119 FUNC printf
>./login.c:1127 FUNC fprintf
>./login.c:1183 FUNC fprintf
>./login.c:1190 FUNC fprintf
>./login.c:1201 FUNC fprintf
>
>./passwd.c:161 FUNC printf
>./passwd.c:174 FUNC printf
>./passwd.c:175 FUNC printf
>./passwd.c:176 FUNC printf
>./passwd.c:181 FUNC printf
>./passwd.c:186 FUNC printf
>./passwd.c:197 FUNC printf
>./passwd.c:204 FUNC printf
>./passwd.c:222 FUNC printf
>./passwd.c:223 FUNC printf
>./passwd.c:277 FUNC fprintf
>./passwd.c:316 FUNC printf
>./passwd.c:323 FUNC printf
>./passwd.c:331 FUNC printf
>./passwd.c:401 FUNC syslog
>./passwd.c:410 FUNC printf
>./passwd.c:414 FUNC printf
>./passwd.c:420 FUNC printf
>
>There is also a few other on other programs but i thought these 2 would be 
>most important since passwd is suid and login could be exploited remotly. 
>I am not very experianced in format strings any help/commets would be 
>great. Would these be able to get exploited?

i'm not sure what utility you used to find those "vulns", but i think that 
author should have his head examined, or perhaps you're just too ignorant 
to know how to properly work it. there are *no* format string 
vulnerabilities in the files you reported. the lack of a format specifier 
does *not* implicate bad code. printf("you are dumb"); is perfectly legal ..


>Regards
>
><mailto:Faulty@....net>Faulty@....net
>
>www.b0f.net
>
>
>
><http://uk.yahoo.com/mail/tagline_xtra/?http://uk.docs.yahoo.com/mail_storage.html>With 
>Yahoo! Mail you can get a bigger mailbox -- choose a size that fits your needs


Powered by blists - more mailing lists