lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5.1.1.6.2.20030126195443.02b3a808@localhost> From: flatline at blackhat.nl (flatline) Subject: format strings vulns in /bin/login and /usr/bin/passwd At 08:13 AM 26-01-2003 +0000, you wrote: >Hello while doing a scan for format strings vulns on util-linux package it >came back with the following results. > >./login.c:398 FUNC fprintf >./login.c:425 FUNC fprintf >./login.c:597 FUNC fprintf >./login.c:614 FUNC fprintf >./login.c:775 FUNC printf >./login.c:796 FUNC fprintf >./login.c:800 FUNC fprintf >./login.c:1109 FUNC syslog >./login.c:1119 FUNC printf >./login.c:1127 FUNC fprintf >./login.c:1183 FUNC fprintf >./login.c:1190 FUNC fprintf >./login.c:1201 FUNC fprintf > >./passwd.c:161 FUNC printf >./passwd.c:174 FUNC printf >./passwd.c:175 FUNC printf >./passwd.c:176 FUNC printf >./passwd.c:181 FUNC printf >./passwd.c:186 FUNC printf >./passwd.c:197 FUNC printf >./passwd.c:204 FUNC printf >./passwd.c:222 FUNC printf >./passwd.c:223 FUNC printf >./passwd.c:277 FUNC fprintf >./passwd.c:316 FUNC printf >./passwd.c:323 FUNC printf >./passwd.c:331 FUNC printf >./passwd.c:401 FUNC syslog >./passwd.c:410 FUNC printf >./passwd.c:414 FUNC printf >./passwd.c:420 FUNC printf > >There is also a few other on other programs but i thought these 2 would be >most important since passwd is suid and login could be exploited remotly. >I am not very experianced in format strings any help/commets would be >great. Would these be able to get exploited? i'm not sure what utility you used to find those "vulns", but i think that author should have his head examined, or perhaps you're just too ignorant to know how to properly work it. there are *no* format string vulnerabilities in the files you reported. the lack of a format specifier does *not* implicate bad code. printf("you are dumb"); is perfectly legal .. >Regards > ><mailto:Faulty@....net>Faulty@....net > >www.b0f.net > > > ><http://uk.yahoo.com/mail/tagline_xtra/?http://uk.docs.yahoo.com/mail_storage.html>With >Yahoo! Mail you can get a bigger mailbox -- choose a size that fits your needs
Powered by blists - more mailing lists