Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 18 Oct 2011 16:12:29 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: double-free vulnerability in logsurfer



----- Original Message -----
> Am 17.10.2011 12:07, schrieb Marcus Meissner:
> > On Mon, Oct 17, 2011 at 12:02:29PM +0200, Timo Warns wrote:
> >> Gregor Kopf of Recurity Labs GmbH found a double-free vulnerability in
> >> Logsurfer affecting the function prepare_exec(). The vulnerability is
> >> caused by an insufficient treatment of an error condition that is
> >> returned by the function get_word() when it is unable to correctly
> >> parse its input.
> >>
> >> The following versions of logsurfer are affected:
> >>
> >>  Logsurfer 1.5b and previous versions
> >>  Logsurfer+ 1.7 and previous versions
> >>
> >> A patch is available at
> >> http://logsurfer.git.sourceforge.net/git/gitweb.cgi?p=logsurfer/logsurfer;a=commit;h=07983748da9ea3d4954b80f02fed692fe21b1134
> > 
> > How can this be exploited?
> > 
> > It seems to happen in the argument handling and I doubt an attacker can
> > inject arguments?
> 
> Logsurfer allows to use substrings of log-file entries as arguments for
> calling external commands. An attacker is able to exploit this
> vulnerability by injecting specially crafted strings into a log-file that
> is processed by logsurfer.
> 

This sounds CVE worthy.

Please use CVE-2011-3626.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.