Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 20 May 2011 11:58:24 -0400
From: Anthon Pang <anthon.pang@...il.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request: GeoIP Directory traversal weakness in geoipupdate

Since this was previosly assigned a CVE ID, i.e., CVE-2007-0159, I'm
requesting a new one for the incomplete fix in 1.4.1, and the new issue
introduced in 1.4.5.

The GeoIP C API is an open source library (LGPL) for MaxMind's GeoIP data
products.

GeoIP-1.4.7.tar.gz (the latest version) contains a directory traversal
weakness whereby a remote malicious update server (responding to requests at
updates.maxmind.com) may overwrite arbitrary files.

apps/geoipupdate.c, added a sanity check in 1.4.1 but does not handle
Windows paths containing backslash or colon.

apps/geoipupdate-pureperl.pl, introduced in 1.4.5, does not filter any
filenames returned by the remote server.

The fix is to reject invalid filenames, e.g., leading '.', or containing
slash, backslash (Windows), or colons (Windows).

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ