6032185 2001-01-31 14:22 +0000  /28 rader/ Joao Gouveia <tharbad@KAOTIK.ORG>
Sänt av: joel@lysator.liu.se
Importerad: 2001-01-31  19:55  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: tharbad@kaotik.org
Mottagare: Bugtraq (import) <15114>
Ärende: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Joao Gouveia <tharbad@KAOTIK.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <008301c08b91$2df28080$501fb00a@cerc.dgaccp.pt>

Hi,

This issue has been discussed in vuln-dev (2001-01-26), see:
http://www.securityfocus.com/templates/archive.pike?end=2001-01-27&tid=15872
4&fromthread=0&start=2001-01-21&threads=1&list=82&

Posted also on suse security list, and aparently overlooked.

The man package that ships with SuSe Linux ( at least versions 6.1
throught 7.0 ) has a format string vulnerability. Also debian 2.2r2 (
at least ), is confirmed to have the same problem.

<quote>
jroberto@spike:~ > man -l %x%x%x%x
man: 4000bc7438049af00: No such file or directory
</quote>

Regards,

Joao Gouveia
------------
tharbad@kaotik.org
(6032185) --------------------------------(Ombruten)
Kommentar i text 6032897 av Roman Drahtmueller <draht@SUSE.DE>
Kommentar i text 6041962 av =?iso-8859-2?Q?Tomasz_Ku=BCniar?= <mezon@PROFNET.PL>
Kommentar i text 6044760 av StyX <styx@MAILBOX.AS>
6032897 2001-01-31 20:43 +0100  /49 rader/ Roman Drahtmueller <draht@SUSE.DE>
Sänt av: joel@lysator.liu.se
Importerad: 2001-01-31  23:48  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: draht@SUSE.DE
Mottagare: Bugtraq (import) <15119>
Kommentar till text 6032185 av Joao Gouveia <tharbad@KAOTIK.ORG>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Roman Drahtmueller <draht@SUSE.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <Pine.LNX.4.30.0101312039510.830-100000@dent.suse.de>

>
> Hi,
>
> This issue has been discussed in vuln-dev (2001-01-26), see:
> http://www.securityfocus.com/templates/archive.pike?end=2001-01-27&tid=15872
> 4&fromthread=0&start=2001-01-21&threads=1&list=82&
>
> Posted also on suse security list, and aparently overlooked.

Yes, it was overread on suse-security@suse.com, the discussion list.
SuSE's security contact is security@suse.de.

There is no guarantee that all of the interesting postings on
suse-security@suse.com can be read. :-(

> The man package that ships with SuSe Linux ( at least versions 6.1 throught
> 7.0 ) has a format string vulnerability. Also debian 2.2r2 ( at least ), is
> confirmed to have the same problem.

We'll fix it. As soon as we can.

Thanks for the note.

>
> <quote>
> jroberto@spike:~ > man -l %x%x%x%x
> man: 4000bc7438049af00: No such file or directory
> </quote>
>
> Regards,
>
> Joao Gouveia
> ------------
> tharbad@kaotik.org
>

Roman.
-- 
 -                                                                      -
| Roman Drahtmüller      <draht@suse.de> //          "Caution: Cape does |
  SuSE GmbH - Security           Phone: //       not enable user to fly."
| Nürnberg, Germany     +49-911-740530 // (Batman Costume warning label) |
 -                                                                      -
(6032897) ------------------------------------------
6041962 2001-02-02 09:36 +0100  /27 rader/ =?iso-8859-2?Q?Tomasz_Ku=BCniar?= <mezon@PROFNET.PL>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-02  21:45  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: mezon@PROFNET.PL
Mottagare: Bugtraq (import) <15177>
Kommentar till text 6032185 av Joao Gouveia <tharbad@KAOTIK.ORG>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: =?iso-8859-2?Q?Tomasz_Ku=BCniar?= <mezon@PROFNET.PL>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20010202093629.A23686@ania.profnet.pl>

On Wed, Jan 31, 2001 at 02:22:01PM -0000, Joao Gouveia wrote:
: The man package that ships with SuSe Linux ( at least versions 6.1 throught
: 7.0 ) has a format string vulnerability. Also debian 2.2r2 ( at least ), is
: confirmed to have the same problem.
:
: <quote>
: jroberto@spike:~ > man -l %x%x%x%x
: man: 4000bc7438049af00: No such file or directory
: </quote>

The same problem in most (all?) distributions is with m4 - GNU macro
processor code, when trying use -G option:

mezon@beata:~$ m4 -G %x%x%x%x
m4: 40012a48380491e00: No such file or directory

--
Tomasz Kuzniar <mezon@profnet.pl>
* Polska Platforma Internetowa *
              ~ ~ ~
"Wyjsc na ludzi - Go out on people"
(6041962) ------------------------------------------
Kommentar i text 6044747 av Mike Gerber <bluehell@GMX.NET>
6044747 2001-02-03 15:54 +0100  /25 rader/ Mike Gerber <bluehell@GMX.NET>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-03  23:36  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: bluehell@GMX.NET
Mottagare: Bugtraq (import) <15197>
Kommentar till text 6041962 av =?iso-8859-2?Q?Tomasz_Ku=BCniar?= <mezon@PROFNET.PL>
Ärende: m4 format string vulnerability [was: Re: SuSe / Debian man
------------------------------------------------------------
 package ...]
From: Mike Gerber <bluehell@GMX.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20010203155430.A3312@kerouac.mg.de>

On Fre, Feb 02, 2001 at 09:36:29 +0100, Tomasz Ku¼niar wrote:
> The same problem in most (all?) distributions is with m4 - GNU macro
> processor code, when trying use -G option:
>
> mezon@beata:~$ m4 -G %x%x%x%x
> m4: 40012a48380491e00: No such file or directory

confirmed for red hat linux 7.0:

[kerouac:mg:~]m4 -G %x
m4: 80499d9: Datei oder Verzeichnis nicht gefunden
[kerouac:mg:~]cat /etc/redhat-release
Red Hat Linux release 7.0 (Guinness)
[kerouac:mg:~]rpm -q m4
m4-1.4.1-3

--
mike gerber
(6044747) ------------------------------------------
Kommentar i text 6048043 av Jarno Huuskonen <Jarno.Huuskonen@UKU.FI>
Kommentar i text 6048058 av Ivo van Poorten <ipoorten@CS.VU.NL>
6048043 2001-02-04 10:27 +0200  /44 rader/ Jarno Huuskonen <Jarno.Huuskonen@UKU.FI>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  05:25  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: Jarno.Huuskonen@UKU.FI
Mottagare: Bugtraq (import) <15209>
Kommentar till text 6044747 av Mike Gerber <bluehell@GMX.NET>
Ärende: Re: m4 format string vulnerability
------------------------------------------------------------
From: Jarno Huuskonen <Jarno.Huuskonen@UKU.FI>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20010204102731.A100390@messi.uku.fi>

On Sat, Feb 03, Mike Gerber wrote:
> confirmed for red hat linux 7.0:
>
> [kerouac:mg:~]m4 -G %x
> m4: 80499d9: Datei oder Verzeichnis nicht gefunden
> [kerouac:mg:~]cat /etc/redhat-release
> Red Hat Linux release 7.0 (Guinness)
> [kerouac:mg:~]rpm -q m4
> m4-1.4.1-3

I don't see this as a big problem, but here's a patch:

--- m4-1.4/src/m4.c.orig	Sat Feb  3 23:06:37 2001
+++ m4-1.4/src/m4.c	Sat Feb  3 23:07:26 2001
@@ -369,7 +369,7 @@

       case 'o':
 	if (!debug_set_output (optarg))
-	  error (0, errno, optarg);
+	  error (0, errno, "%s", optarg);
 	break;

       case 's':
@@ -466,7 +466,7 @@
 	    fp = path_search (argv[optind]);
 	    if (fp == NULL)
 	      {
-		error (0, errno, argv[optind]);
+		error (0, errno, "%s", argv[optind]);
 		continue;
 	      }
 	    else

One thing I noticed: if your system doesn't have mkstemp/tmpfile
m4 comes with its own implementation of tmpfile/mkstemp.
This uses mktemp and open (w/out O_EXCL).

-Jarno
(6048043) ------------------------------------------
6048058 2001-02-04 04:05 +0000  /32 rader/ Ivo van Poorten <ipoorten@CS.VU.NL>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  05:45  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: ivop@euronet.nl
Mottagare: Bugtraq (import) <15213>
Kommentar till text 6044747 av Mike Gerber <bluehell@GMX.NET>
Ärende: Re: m4 format string vulnerability [was: Re: SuSe / Debian man
------------------------------------------------------------
 package ...]
From: Ivo van Poorten <ipoorten@CS.VU.NL>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <01020404055500.18404@morris.paisley.park>

On Saturday 03 February 2001 14:54, Mike Gerber wrote:
> confirmed for red hat linux 7.0:
>
> [kerouac:mg:~]m4 -G %x
> m4: 80499d9: Datei oder Verzeichnis nicht gefunden
> [kerouac:mg:~]cat /etc/redhat-release
> Red Hat Linux release 7.0 (Guinness)
> [kerouac:mg:~]rpm -q m4
> m4-1.4.1-3

Same here:

[ivo@vanity ~]$ m4 -G %x
m4: 80497fb: No such file or directory
[ivo@vanity ~]$ rpm -q m4
m4-1.4-17mdk
[ivo@vanity ~]$ cat /etc/mandrake-release
Linux Mandrake release 7.2 (Odyssey) for i586

--Ivo

--
If the Windows desktop starts to topple, it's like a redwood tree.
It takes a long time for it to fall, but it's really hard to stop once
it starts. -- Carl Howe.
(6048058) ------------------------------------------
6044760 2001-02-03 16:30 +0100  /50 rader/ StyX <styx@MAILBOX.AS>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-03  23:41  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: styx@MAILBOX.AS
Mottagare: Bugtraq (import) <15198>
Kommentar till text 6032185 av Joao Gouveia <tharbad@KAOTIK.ORG>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: StyX <styx@MAILBOX.AS>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <3A7C2431.35F9FD10@mailbox.as>

Joao Gouveia wrote:
>
> Hi,
>
> This issue has been discussed in vuln-dev (2001-01-26), see:
> http://www.securityfocus.com/templates/archive.pike?end=2001-01-27&tid=15872
> 4&fromthread=0&start=2001-01-21&threads=1&list=82&
>
> Posted also on suse security list, and aparently overlooked.
>
> The man package that ships with SuSe Linux ( at least versions 6.1 throught
> 7.0 ) has a format string vulnerability. Also debian 2.2r2 ( at least ), is
> confirmed to have the same problem.
>
> <quote>
> jroberto@spike:~ > man -l %x%x%x%x
> man: 4000bc7438049af00: No such file or directory
> </quote>
>
> Regards,
>
> Joao Gouveia
> ------------
> tharbad@kaotik.org

Hmm... What about this?

styx@SuxOS-devel:~$ man -l %n%n%n%n
man: Segmentation fault
styx@SuxOS-devel:~$

This was on my Debian 2.2 potato system (It doesn't dump core though).

--

StyX
styx@mailbox.as

-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GCM/CS/CC/IT d?>d s:>s++:++ a? C++>C++++$ UL++++
P+>P+++++ L+++>L+++++ E--- W++>$ N++ w--- PS PE Y+
PGP>PGP+++ t+ 5 X+ R+ tv+ b+ D-- G++ e->e+++++ h-->h++ y?
------END GEEK CODE BLOCK------
(6044760) ------------------------------------------
Kommentar i text 6048039 av Robert van der Meulen <rvdm@CISTRON.NL>
Kommentar i text 6048048 av Martin Schulze <joey@FINLANDIA.INFODROM.NORTH.DE>
6048039 2001-02-04 01:48 +0100  /24 rader/ Robert van der Meulen <rvdm@CISTRON.NL>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  05:21  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: rvdm@CISTRON.NL
Mottagare: Bugtraq (import) <15208>
Kommentar till text 6044760 av StyX <styx@MAILBOX.AS>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Robert van der Meulen <rvdm@CISTRON.NL>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20010204014834.A1351@lin-gen.com>

Hi,

Quoting StyX (styx@MAILBOX.AS):
> styx@SuxOS-devel:~$ man -l %n%n%n%n
> man: Segmentation fault
> styx@SuxOS-devel:~$
>
> This was on my Debian 2.2 potato system (It doesn't dump core though).
Just for the record:
on a lot of systems (including Debian), 'man' is not suid/sgid anything, and
this doesn't impose a security problem.
I don't know about Suse/Redhat/others.

Greets,
	Robert

--
				Linux Generation
(6048039) ------------------------------------------
Kommentar i text 6048120 av Ethan Benson <erbenson@ALASKA.NET>
Kommentar i text 6048136 av Valdis Kletnieks <Valdis.Kletnieks@VT.EDU>
6048120 2001-02-04 21:06 -0900  /34 rader/ Ethan Benson <erbenson@ALASKA.NET>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  07:31  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: erbenson@ALASKA.NET
Mottagare: Bugtraq (import) <15216>
Kommentar till text 6048039 av Robert van der Meulen <rvdm@CISTRON.NL>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
On Sun, Feb 04, 2001 at 01:48:34AM +0100, Robert van der Meulen wrote:
> Hi,
> 
> Quoting StyX (styx@MAILBOX.AS):
> > styx@SuxOS-devel:~$ man -l %n%n%n%n
> > man: Segmentation fault
> > styx@SuxOS-devel:~$
> >
> > This was on my Debian 2.2 potato system (It doesn't dump core though).
> Just for the record:
> on a lot of systems (including Debian), 'man' is not suid/sgid anything, and
> this doesn't impose a security problem.
> I don't know about Suse/Redhat/others.

This is not correct, on debian man is suid man and /var/cache/man
(cached preformatted man pages) is owned by user man.  It is suid
rather then setgid so users do not end up owning more files in /var.  

on debian /usr/bin/man is really a wrapper program which when run as
root does a setuid man before execing /usr/lib/man-db/man.  The idea
is to prevent a user man compromise from turning into a root
compromise.  (compromise user man, replace man binaries, wait for root
or cron to run man/mandb)

$ ls -l /usr/lib/man-db/man*
-rwsr-xr-x    1 man      root        94676 Apr  6  2000 /usr/lib/man-db/man
-rwsr-xr-x    1 man      root        74168 Apr  6  2000 /usr/lib/man-db/mandb
$

-- 
Ethan Benson
http://www.alaska.net/~erbenson/
(6048120) ------------------------------------------
Bilaga (application/pgp-signature) i text 6048121
6048121 2001-02-04 21:06 -0900  /10 rader/ Ethan Benson <erbenson@ALASKA.NET>
Importerad: 2001-02-05  07:31  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: erbenson@ALASKA.NET
Mottagare: Bugtraq (import) <15217>
Bilaga (text/plain) till text 6048120
Ärende: Bilaga till: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjp+QuAACgkQJKx7GixEevx3mQCdHcal/va+li1PnWthNOKQixmb
vR0An0Ut/xWY9t1ad45V9jEzBjNdnZ3M
=r2C7
-----END PGP SIGNATURE-----
(6048121) ------------------------------------------
6048136 2001-02-05 00:12 -0500  /22 rader/ Valdis Kletnieks <Valdis.Kletnieks@VT.EDU>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  07:51  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: Valdis.Kletnieks@VT.EDU
Mottagare: Bugtraq (import) <15219>
Kommentar till text 6048039 av Robert van der Meulen <rvdm@CISTRON.NL>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Valdis Kletnieks <Valdis.Kletnieks@VT.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <200102050512.f155CVV19060@foo-bar-baz.cc.vt.edu>

On Sun, 04 Feb 2001 01:48:34 +0100, Robert van der Meulen <rvdm@CISTRON.NL>  said:
> Just for the record:
> on a lot of systems (including Debian), 'man' is not suid/sgid anything, and
> this doesn't impose a security problem.

Although it may not apply to *this* *particular* issue, let's all not
forget that just because something is not suid/sgid it's not a
security issue.  I'm sure that both 'man' and 'm4' get run a *lot* as
root, and have we forgotten the .sy nroff command and trojan
manpages? ;)

It will be a security problem as soon as somebody finds a way to get
root to run 'man -l %n' or 'm4 -G %n'.... ;)

				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech
(6048136) --------------------------------(Ombruten)
6048048 2001-02-04 11:05 +0100  /52 rader/ Martin Schulze <joey@FINLANDIA.INFODROM.NORTH.DE>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  05:34  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: joey@infodrom.north.de
Mottagare: Bugtraq (import) <15211>
Kommentar till text 6044760 av StyX <styx@MAILBOX.AS>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Martin Schulze <joey@FINLANDIA.INFODROM.NORTH.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20010204110554.V15483@finlandia.infodrom.north.de>

StyX wrote:
> Joao Gouveia wrote:
> >
> > Hi,
> >
> > This issue has been discussed in vuln-dev (2001-01-26), see:
> > http://www.securityfocus.com/templates/archive.pike?end=2001-01-27&tid=15872
> > 4&fromthread=0&start=2001-01-21&threads=1&list=82&
> >
> > Posted also on suse security list, and aparently overlooked.
> >
> > The man package that ships with SuSe Linux ( at least versions 6.1 throught
> > 7.0 ) has a format string vulnerability. Also debian 2.2r2 ( at least ), is
> > confirmed to have the same problem.
> >
> > <quote>
> > jroberto@spike:~ > man -l %x%x%x%x
> > man: 4000bc7438049af00: No such file or directory
> > </quote>
> >
> > Regards,
> >
> > Joao Gouveia
> > ------------
> > tharbad@kaotik.org
>
> Hmm... What about this?
>
> styx@SuxOS-devel:~$ man -l %n%n%n%n
> man: Segmentation fault
> styx@SuxOS-devel:~$
>
> This was on my Debian 2.2 potato system (It doesn't dump core though).

Please tell me what you gain from this.  man does not run setuid
root/man but only setgid man.  So all you can exploit this to is a
shell running under your ownl user ide.

Please correct me if I'm mistaken.

Regards,

	Joey

--
GNU GPL: "The source will be with you... always."
(6048048) --------------------------------(Ombruten)
Kommentar i text 6048133 av Jose Nazario <jose@BIOCSERVER.BIOC.CWRU.EDU>
6048133 2001-02-04 23:29 -0500  /19 rader/ Jose Nazario <jose@BIOCSERVER.BIOC.CWRU.EDU>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-05  07:49  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: jose@BIOCSERVER.BIOC.CWRU.EDU
Mottagare: Bugtraq (import) <15218>
Kommentar till text 6048048 av Martin Schulze <joey@FINLANDIA.INFODROM.NORTH.DE>
Ärende: Re: SuSe / Debian man package format string vulnerability
------------------------------------------------------------
From: Jose Nazario <jose@BIOCSERVER.BIOC.CWRU.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <Pine.LNX.4.30.0102042328410.23404-100000@biocserver.BIOC.CWRU.Edu>

On Sun, 4 Feb 2001, Martin Schulze wrote:

> Please tell me what you gain from this.  man does not run setuid
> root/man but only setgid man.  So all you can exploit this to is a
> shell running under your ownl user ide.

sucker admins who m4 their sendmail.mc's as root, chiefly if you trick
them into processing an untrusted and untrustworthy .mc file.

____________________________
jose nazario						     jose@cwru.edu
	      	     PGP: 89 B0 81 DA 5B FD 7E 00  99 C3 B2 CD 48 A0 07 80
				       PGP key ID 0xFD37F4E5 (pgp.mit.edu)
(6048133) ------------------------------------------
6041677 2001-02-02 11:10 +0100  /14 rader/ Manuel Martinez Herraiz <maherma@JAZZFREE.COM>
Sänt av: joel@lysator.liu.se
Importerad: 2001-02-02  19:48  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: maherma@JAZZFREE.COM
Mottagare: Bugtraq (import) <15173>
Ärende: Re: String vun. in m4 macro processor (same as in man)
------------------------------------------------------------
Hi,
RedHat 6.1/6.2 also have this problem:

REDHAT 6.2
[root@haendel mmh]# m4 -G %p
m4: 0x401091ec: No existe el fichero o el directorio

REDHAT 6.1
[root@mandanga mmh]# m4 -G %p
m4: 0x4010548c: No existe el fichero o el directorio

Manuel Martinez.
(6041677) ------------------------------------------