BugTraq
Re: DJB's students release 44 *nix software vulnerability advisories Dec 20 2004 11:14PM
Jonathan T Rockway (jrockw2 uic edu) (7 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:22PM
laffer1 (laffer1 mail foolishgames com) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 06:06AM
Jonathan Rockway (jrockw2 uic edu)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:11PM
Thor (thor hammerofgod com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:50PM
Dave Holland (dh3 sanger ac uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:55PM
sean (infamous41md hotpop com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:34PM
milw0rm Inc. (milw0rm gmail com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 11:58PM
Jack Lloyd (lloyd randombit net)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 21 2004 09:30PM
Antoine Martin (antoine nagafix co uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 22 2004 12:23PM
Chris Paget (ivegotta tombom co uk)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:22PM
Stephen Harris (bugtraq spuddy org)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:14PM
Raymond M. Reskusich (reskusic uiuc edu)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 07:59PM
David F. Skoll (dfs roaringpenguin com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 03:50AM
Jonathan Rockway (jrockw2 uic edu) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 23 2004 04:49PM
Michal Zalewski (lcamtuf dione ids pl)
On Tue, 21 Dec 2004, Jonathan Rockway wrote:

> /bin/sh exists to run shell commands. That is the purpose of the
> shell. NASM, on the other hand, is designed to create object files
> from assembly files. If NASM starts running arbitrary code on your
> machine, it's doing something unauthorized. That is a security hole.

Consider this example: I am sending you an e-mail telling you to type
"/usr/local/bin/game_of_pong AAAAAAAAAAAAAAAA(...)$ASCII_SHELLCODE". The
game_of_pong utility happens to be have a command-line parameter buffer
overflow problem. If you follow my instructions, you will get 0wned.

The aforementioned application has a flaw, and as a result, did something
it was not designed for. This does not constitute a remotely exploitable
vulnerability by our standards, however. If it did, *all* bugs would
belong to that category.

What happened is that the user had became a wetware REMOTE->LOCAL gateway
for all kinds of attacks, if he can be tricked into feeding untrusted and
unchecked input received over the network into programs that were never
designed to handle such information.

We may and should blame the author for writing shoddy code, but this is
not a remotely exploitable flaw in his software.

I am not saying such a two-factor attack fits the "local" label; I am
simply saying it does not belong to the "remote" bunch.

/mz
http://lcamtuf.coredump.cx/

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus