Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 21 Nov 2014 10:49:43 +0100
From: Marcus Meissner <meissner@...e.de>
To: oss-security@...ts.openwall.com
Cc: falonsoe@...hat.com
Subject: Re: CVE-2014-7817 glibc: command execution in
 wordexp() with WRDE_NOCMD specified

On Thu, Nov 20, 2014 at 07:17:22PM +0000, mancha wrote:
> On Thu, Nov 20, 2014 at 11:38:20AM -0500, Francisco Alonso wrote:
> > Hello,
> > 
> > It was discovered that the wordexp() function could ignore the WRDE_NOCMD flag under certain input conditions resulting in the execution 
> > of a shell for command substitution when the applicaiton did not request it. 
> > 
> > Bug report:
> > https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2014-7817
> > 
> > Git commit:
> > https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c
> > 
> > References:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1157689
> > https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html
> 
> Francisco, thanks for the post.
> 
> After a lightning review of one of my systems, I found the following use
> glibc's wordexp: adobe's flash plugin, ardour2, mailx, enca. I've not
> looked into which input is under a would-be-attacker's control.

I quickly had a look at flash-player diassembler and it calls wordexp with flags=0 in 3 places.

So it even calls the unsafe variant.

Ciao, Marcus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.