BugTraq
Re: DJB's students release 44 *nix software vulnerability advisories Dec 20 2004 11:14PM
Jonathan T Rockway (jrockw2 uic edu) (7 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:22PM
laffer1 (laffer1 mail foolishgames com) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 06:06AM
Jonathan Rockway (jrockw2 uic edu)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:11PM
Thor (thor hammerofgod com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:50PM
Dave Holland (dh3 sanger ac uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:55PM
sean (infamous41md hotpop com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:34PM
milw0rm Inc. (milw0rm gmail com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 11:58PM
Jack Lloyd (lloyd randombit net)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 21 2004 09:30PM
Antoine Martin (antoine nagafix co uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 22 2004 12:23PM
Chris Paget (ivegotta tombom co uk)

Antoine Martin wrote:

<snip>

> * gentoo systems by compromising one of the master servers (or more
> simply by hijacking the connection to one of the those servers) to serve
> the malicious file - but in this case you probably don't really need
> this exploit to compromise the system.
> * other automated build systems (no generic name comes to mind) which
> download the files they work on from other systems - which may not be
> trusted to the point that grants a shell but just enough to provide
> input.
> * compromising any open-source software's repository that already uses
> nasm and placing the exploit file in the default build target - tough,
> but not impossible (it has happened before and will happen again).

If you have compromised a source code repository wth the knowledge that
the code in that repository will be compiled and run on your target
system, then why would you go to all the effort of exploiting a NASM
buffer overflow? Simply write your trojan / backdoor / whatever in
regular ASM or C, and let it get compiled as regular code. Exploiting
NASM in this case gains you nothing, and actually makes your life
considerably harder.

I have difficulty in seeing this as a "remote" exploit; it's entirely
dependant upon a piece of code (NASM) being invoked by a user on the
local system with your arbitrary data being supplied. Surely the very
definition of a remote exploit is one that gives you the ability to run
code on a system which you otherwise could not; ie a remote user with no
access at all.

I'm curious - if you class this as a "remote" vulnerability, what would
you class as a "local" bug, and what is the distinction as you see it?

Chris

--
Chris Paget
ivegotta (at) tombom.co (dot) uk [email concealed]

[ reply ]
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:22PM
Stephen Harris (bugtraq spuddy org)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:14PM
Raymond M. Reskusich (reskusic uiuc edu)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 07:59PM
David F. Skoll (dfs roaringpenguin com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 03:50AM
Jonathan Rockway (jrockw2 uic edu) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 23 2004 04:49PM
Michal Zalewski (lcamtuf dione ids pl)


 

Privacy Statement
Copyright 2010, SecurityFocus