Date: Sat, 27 Jun 1998 02:21:02 -0700 (PDT) From: bow <bow@bow.net> To: Igor Roshchin <igor@physics.uiuc.edu> Cc: freebsd-security@FreeBSD.ORG Subject: Re: (FWD) QPOPPER REMOTE ROOT EXPLOIT Message-ID: <v03110701b1ba0652ee75@[204.210.38.36]> In-Reply-To: <199806270818.DAA19951@alecto.physics.uiuc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
This is a realllly quick fix. There is probably 100 ways to do it better, but this is better then turning qpopper off. -bow *** qpopper2.41beta1-qfix/pop_msg.c Wed Nov 19 13:20:38 1997 --- qpopper2.41beta1/pop_msg.c Sat Jun 27 02:15:59 1998 *************** *** 63,74 **** /* Append the message (formatted, if necessary) */ if (format) #ifdef HAVE_VPRINTF ! vsprintf(mp,format,ap); #else # ifdef PYRAMID ! (void)sprintf(mp,format, arg1, arg2, arg3, arg4, arg5, arg6); # else ! (void)sprintf(mp,format,((int *)ap)[0],((int *)ap)[1],((int *)ap)[2], ((int *)ap)[3],((int *)ap)[4]); # endif #endif --- 63,74 ---- /* Append the message (formatted, if necessary) */ if (format) #ifdef HAVE_VPRINTF ! vsnprintf(mp,MAXLINELEN-8,format,ap); #else # ifdef PYRAMID ! (void)snprintf(mp,MAXLINELEN-8,format, arg1, arg2, arg3, arg4, arg5, arg6); # else ! (void)snprintf(mp,MAXLINELEN-8,format,((int *)ap)[0],((int *)ap)[1],((int *)ap)[2], ((int *)ap)[3],((int *)ap)[4]); # endif #endif >This dumps core on a 2.2.5-RELEASE box. >After sending over 40 thousand of symbols I just kill -HUP the >connection to the popper, and it dumps the core. >I don't know how exploitable it though. > >Anybody can come up with a quick patch ? > > >Thanks, >IgoR > > >>From owner-bugtraq@NETSPACE.ORG Sat Jun 27 01:32:44 1998 >Return-Path: <owner-bugtraq@NETSPACE.ORG> >Received: from brimstone.netspace.org (brimstone.netspace.org >[128.148.157.143]) > by alecto.physics.uiuc.edu (8.9.0/8.9.0) with ESMTP id BAA09012 > for <igor@ALECTO.PHYSICS.UIUC.EDU>; Sat, 27 Jun 1998 01:32:43 -0500 >(CDT) >Received: from unknown@netspace.org (port 24361 [128.148.157.6]) by >brimstone.netspace.org with ESMTP id <96303-23463>; Sat, 27 Jun 1998 >02:33:46 -0400 >Received: from NETSPACE.ORG by NETSPACE.ORG (LISTSERV-TCP/IP release 1.8c) >with > spool id 1429436 for BUGTRAQ@NETSPACE.ORG; Sat, 27 Jun 1998 02:31:20 > -0400 >Received: from brimstone.netspace.org (brimstone.netspace.org > [128.148.157.143]) by netspace.org (8.8.7/8.8.7) with ESMTP id > CAA06737 for <BUGTRAQ@NETSPACE.ORG>; Sat, 27 Jun 1998 02:30:07 -0400 >Received: from unknown@netspace.org (port 24361 [128.148.157.6]) by > brimstone.netspace.org with ESMTP id <80634-23467>; Sat, 27 Jun 1998 > 02:32:05 -0400 >Approved-By: aleph1@DFW.NET >Received: from musket.eliwhitney.org ([209.182.72.70]) by netspace.org > (8.8.7/8.8.7) with ESMTP id BAA28453 for <BUGTRAQ@netspace.org>; >Sat, > 27 Jun 1998 01:02:39 -0400 >Received: from dell166 ([199.174.185.18]) by musket.eliwhitney.org (Netscape > Messaging Server 3.5) with SMTP id 373 for <BUGTRAQ@netspace.org>; > Sat, 27 Jun 1998 01:04:21 -0400 >X-Sender: X-Mailer: >Mime-Version: 1.0 >Content-Type: text/plain; charset="us-ascii" >Message-ID: <19980627050419750.AAA323.373@dell166> >Date: Sat, 27 Jun 1998 00:58:24 -0400 >Reply-To: Seth McGann <smm@WPI.EDU> >Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG> >From: Seth McGann <smm@WPI.EDU> >Subject: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT >To: BUGTRAQ@NETSPACE.ORG >Status: RO > >Its come to my attention that systems around the internet are being >exploited using a new remote overflow in Qualcomm's Popper server. Well, >lets clear a few things up: > >1. The working exploit was stolen from my development account, >subsequently MANY sites were cracked in short order. Much of Efnet was >compromised as power crazed script kiddies gained root access on IRCOP >boxes, giving themselves O-lines. > >2. This vulnerability effects FreeBSD, OpenBSD, and Solaris x86 so far. >Other systems are most certainly vulnerable. Linux does not appear >vulnerable. To test, simply send the sever several thousand characters and >see if it crashed. Check the return address to see if it matches. > >3. Due to massive exploitation the proper authorities have most likely >been notified already. This is a bit of an emergency. > >4. You will NOT get the "exploit" from me, don't ask. If you think your >"eleet" enough, do it yourself. I admit I had some help, but it took a >while to figure out. > >5. The most obvious offender is the vsprintf() on line 66 of pop_msg.c. > >6. If you have a problem with my style, I'm sorry. I'm angry at both >myself and the members of #conflict who I hold directly responsible for >this breach. I will not name names, the offenders know who they are. > >7. When I have my head together I will post a patch tomorrow if one is not >available by then. > >8. For now, disable qpopper or choose another solution till qpopper is >secured. > >Thank you. > > > >Seth M. McGann / smm@wpi.edu "Security is making it >http://www.wpi.edu/~smm to the bathroom in time." >KeyID: 2048/1024/E2501C80 >Fingerprint 3344 DFA2 8E4A 977B 63A7 19E3 6AF7 4AE7 E250 1C80 > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?v03110701b1ba0652ee75>