Date: Fri, 21 Jun 2013 04:09:48 -0400 (EDT) From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org>, Axel Beckert <abe@...ian.org>, Nico Golde <nion@...ian.org>, "W. Martin Borgert" <debacle@...ian.org> Subject: CVE Request -- tpp: Possibility of arbitrary code execution when processing untrusted TPP template Hello Kurt, Steve, vendors, A security flaw was found in the way tpp, a ncurses-based presentation tool, processed TPP templates containing --exec clause (input provided as an argument of the --exec clause would be immediately executed without requesting a second confirmation from the user). A remote attacker could provide a specially-crafted text presentation program (TPP) template that, when processed with the tpp binary would lead to arbitrary code execution with the privileges of the user running the tpp executable. References:  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644  http://patch-tracker.debian.org/patch/series/view/tpp/1.3.1-3/15-optional-exec.patch (Debian distribution patch)  https://bugzilla.redhat.com/show_bug.cgi?id=976684 Upstream patch / GitHub link:  https://github.com/xtaran/tpp/commit/350aafbd9a3256f6d479dacb9740bf3f0b9a3fc3 Could you allocate a CVE id for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.