lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.44.0411181232570.24977-100000@accip02.physik.rwth-aachen.de> Date: Thu, 18 Nov 2004 12:42:33 +0100 (CET) From: Hans-Bernhard Broeker <broeker@...sik.rwth-aachen.de> To: rexolab <research@...otec.com> Cc: bugtraq@...urityfocus.com, cert@...t.org, vuln@...unia.com, full-disclosure@...ts.netsys.com Subject: Re: RX171104 Cscope v15.5 and minors - symlink vulnerability - advisory, exploit and patch. On Thu, 18 Nov 2004, rexolab wrote: > VulnDiscovery: 2003/05/21 > Release Date : 2004/11/17 Surely you're joking, Mr. Gangstuck. You can't seriously be telling us you sat on this for no less than 18 months, without telling anybody about it. Actually, I somewhat doubt you even discovered this yourself --- what with this very bug having been posted to cscope's bugtracker on 2004-11-09. > Status : vendor has just been notified. Actually, we've been notified 11 days ago, and apparently not by you. > First, the temporary directory (P_tmpdir="/tmp") is badly handled > in every myfopen() internal call. [... there doesn't seem to be a "second", to that first...] Anyway, you're right, the vulnerability is there. Unfortunately your patch is not quite sufficient to close it, because you overlooked that temp2, one of the two predictable filenames, is also used to construct an output redirection for a shell command run by cscope. -- Hans-Bernhard Broeker (broeker@...sik.rwth-aachen.de) Even if all the snow were burnt, ashes would remain. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists