Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 22 Nov 2010 11:32:38 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com, me@...ji.com
Subject: Re: CVE Request: gif2png: command-line buffer overflow
 problem


This type of error may happen when executing from a shell, but not 
necessarily *every* shell, and not when shell execution is bypassed e.g. 
when using exec()... so the vulnerable program might still execute.

- Steve


On Mon, 22 Nov 2010, Benji wrote:

> "File name too long"
>
> ------Original Message------
> From: Dan Rosenberg
> To: oss-security@...ts.openwall.com
> ReplyTo: oss-security@...ts.openwall.com
> Subject: Re: [oss-security] CVE Request: gif2png: command-line buffer overflow problem
> Sent: Nov 22, 2010 00:19
>
> How could this possibly be exploited?  If you can trick a user into
> running gif2png [exploit payload], then that user has already lost.
>
> See also:
> make `perl -e 'print "A"x10000'`
>
> -Dan
>
> On Sun, Nov 21, 2010 at 6:45 PM, Kurt Seifried <kurt@...fried.org> wrote:
>> This is from 2009 but doesn't appear to have a CVE (no "gif2png" in
>> the CVE database).
>>
>> Sources:
>> https://bugzilla.redhat.com/show_bug.cgi?id=547515
>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978
>> http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/072009.html
>>
>> Description:
>> A buffer overflow in gif2png 2.5.3 and earlier allows an attacker to
>> execute arbitrary code via a long command line argument passed to the
>> gif2png binary.
>>
>> It was first claimed that it was fixed in 2.5.2 but it is reported
>> that it isn't fixed, I tested 2.5.3 and it still seg faults the same
>> way as 2.5.2 so it would appear it was never fixed, as the software
>> was last updated in 2005 I guess this one never gets fixed.
>>
>> --
>> Kurt Seifried
>> kurt@...fried.org
>> tel: 1-703-879-3176
>>
>
>
> Sent from my BlackBerry® wireless device
>
>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ