lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <a401c74d0710302129g42d456e0he78a77159bb1c32c@mail.gmail.com> Date: Wed, 31 Oct 2007 00:29:15 -0400 From: glopeda.com <glopeda@...peda.com> To: full-disclosure@...ts.grok.org.uk Subject: [+] Vulnerability in less version 394 and prior From: glopeda@...peda.com Application: less 394 and prior Type: Format strings vulnerability Priority: Low There exists a format strings bug in the less application present in most flavors of UNIX. It could be leveraged for privilege escalation if the calling application is setuid/setgid and does not properly drop privileges. Meager demonstration: $ export LESSOPEN=%s%n $ less somefile Segmentation fault $ See http://www.glopeda.com for more details. -- Site: http://www.glopeda.com E-mail: glopeda@...peda.com Name: Mitch _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/