lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <81637804AB36A644BBDE3ED9DD4E73FDFA1E7A@hermes.eCompany.gov>
Date: Tue, 18 May 2004 15:23:16 -0700
From: "Drew Copley" <dcopley@...e.com>
To: <noderat@...mail.com>, <bugtraq@...urityfocus.com>
Subject: RE: Buffer Overflow in ActivePerl ?


 

> -----Original Message-----
> From: noderat@...mail.com [mailto:noderat@...mail.com] 
> Sent: Tuesday, May 18, 2004 9:11 PM
> To: bugtraq@...urityfocus.com
> Subject: Re: Buffer Overflow in ActivePerl ?
> 
> In-Reply-To: <40AAB885.10935.31071242@...alhost>
> 
> >Looks like full control of EIP...
> 
> >
> 
> >However, there is not likely to be a privilege escalation 
> here unless 
> 
> >perhaps a script processor on a web server can be cajoled into doing 
> 
> >something with this??  (Not at all familiar with the innards 
> of Windows 
> 
> >web servers and their relationship to their CGI, etc processors...)
> 
> >
> 
> >
> 
> >-- 
> 
> >Nick FitzGerald
> 
> >Computer Virus Consulting Ltd.
> 
> >Ph/FAX: +64 3 3529854
> 
> >
> 
> >
> 
> 
> 
> Unethical intruders don't always require "privilege 
> escalation", executing code on another system is enough, 
> depending on the goal.
> 
> 
> 
> Networks where say developers are sharing source tree's and 
> the like, placing a hostile piece of code in the central 
> store will allow remote code execution on the developer nodes.

The beauty of holes in perl itself is the possibility that
it could affect a widerange of perl scripts out there sleeping on
people's webservers, though.

I would guess, however, a function named "system" is not likely
used by very many scripts and probably has some serious other issues.

... looking ...

http://iis1.cps.unizar.es/Oreilly/perl/learn32/ch14_01.htm#ch14-23962

example given:
system("dir >this_dir") && die "cannot create this_dir";

...

Yeah, so if you have control over the parameter of "system" call
in perl on a webserver, you have complete access, anyway.

People should look at the other functions in there. This is interesting
as it may be that there are more easily accessible functions in there
which may be exploitable. 

With an overflow attack, or similiar, you would bypass - likely - most
mechanisms designed to filter out your typical injection attacks which
generally rely on logical operators and the such -- not just too long
of variables or otherwise improper but valid variables.

> 
> 
> 
> Other registers other than EIP can be written, depending on 
> the version, however we need not rely on EIP to allow for a 
> buffer overflow exploit, we don't "need" to overwrite any 
> register in fact to execute code, only to cause a buffer overflow  >;]
> 
> 
> 
> cheers
> 
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ