Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jan 2006 12:50:10 GMT
From:      Ion-Mihai Tetcu <itetcu@people.tecnik93.com>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: ports/92359: [MAINTAINER] net-im/kpopup: FORBIDDEN (local root exploit); contains the VuXML entry
Message-ID:  <200601261250.k0QCoA7G004269@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/92359; it has been noted by GNATS.

From: Ion-Mihai Tetcu <itetcu@people.tecnik93.com>
To: "Simon L. Nielsen" <simon@FreeBSD.org>
Cc: FreeBSD gnats submit <FreeBSD-gnats-submit@FreeBSD.org>
Subject: Re: ports/92359: [MAINTAINER] net-im/kpopup: FORBIDDEN (local root
 exploit); contains the VuXML entry
Date: Thu, 26 Jan 2006 14:48:04 +0200

 --MP_6dyp7e.H=Bxbhl9UQCt/stc
 Content-Type: text/plain; charset=US-ASCII
 Content-Transfer-Encoding: 7bit
 Content-Disposition: inline
 
 On Thu, 26 Jan 2006 13:22:42 +0100
 "Simon L. Nielsen" <simon@FreeBSD.org> wrote:
 
 > On 2006.01.26 13:46:56 +0200, Ion-Mihai IOnut Tetcu wrote:
 > 
 > Thanks, a few comments for the VuXML part (I can't commit it untill
 > tonight)
 
 It's 3 years old, I doubt a few hours will make much difference :)
  
 > > --- vuln.xml.cvs	Thu Jan 26 11:40:13 2006
 > > +++ vuln.xml	Thu Jan 26 12:44:27 2006
 > > @@ -34,6 +34,43 @@
 > >  
 > >  -->
 > >  <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
 > > +  <vuln vid="1613db79-8e52-11da-8426-000fea0a9611">
 > > +    <topic> kpopup -- local root exploit and local denial of
 > > service</topic>
 >               ^ shouldn't be space here.
 > > +    <affects>
 > > +      <package>
 > > +	<name>kpopup</name>
 > > +	<range><ge>0.9.1</ge><le>0.9.5</le></range>
 > > +      </package>
 > > +    </affects>
 > > +    <description>
 > > +      <body xmlns="http://www.w3.org/1999/xhtml">;
 > > +	<p>Mitre CVE reports:</p>
 > > +	<blockquote
 > > cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1170">;
 > 
 > When using a blockquote the content must be exactly the text from the
 > source, CVE in this case.  Minor typo or spelling fixes are OK, but
 > only minor things.  It's fine to use multiple blockquotes in the same
 > VuXML entry, the leading text for each blockquote should just make it
 > clear where the quote is from.
 > 
 > For text you have written (e.g. the last credit line) simply put it at
 > the "outer layer", I.E. not in a block quote.  The reason that I
 > generally prefer block quotes for the main description is simple that
 > it's faster to "steal" somebody elses description (with credit of
 > cause), than phrasing the issue myself.  That said I sometimes end up
 > writing it myself if I feel the other source texts I can find aren't
 > very good.
 
 OK, so I broke the above in 2 blockqoutes and move credits outside,
 after them. I also corrected in the first "and" --> "-", since all
 versions between are affected.
 
 > Since I'm blabbering on anyway, I might as well point you at my page
 > with VuXML notes http://simon.nitro.dk/vuxml.html .  Some day that
 > will be added to the Porters Handbook.. some day :-).
 
 Thanks.
 
 > > +	  <p>Format string vulnerability in main.cpp in kpopup
 > > 0.9.1-0.9.5pre2
 > > +          allows local users to cause a denial of service
 > > (segmentation fault)
 > > +          and possibly execute arbitrary code via format string
 > > specifiers in
 > > +          command line arguments.
 > > +          misc.cpp in KPopup 0.9.1 trusts the PATH variable when
 > > executing killall,
 > > +          which allows local users to elevate their privileges by
 > > modifying the
 > > +          PATH variable to reference a malicious killall program.
 > > +          SecurityFocus credits "b0f" b0fnet@yahoo.com</p>
 > > +	</blockquote>
 > > +      </body>
 > > +    </description>
 > > +    <references>
 > > +     <cvename>CVE-2003-1170</cvename>
 > > +     <bid>8918</bid>
 > > +     <cvename>CVE-2003-1167</cvename>
 > > +     <bid>8915</bid>
 > > +     <url>http://www.securityfocus.com/archive/1/342736</url>;
 > > +     <url>http://www.henschelsoft.de/kpopup_en.html</url>;
 > 
 > I generally sort plain alphabetically, but that's not very important.
 
 CVE and bid are sorted in the order of blockquote content. The next
 link points to the disclosure and exploit examples. The link to the
 author page is less informative hence is the latest. The reader won't
 probably go to all the links, so the most informative are first; but
 feel free to reorder them if you like.
 
 
 -- 
 IOnut - Unregistered ;) FreeBSD "user"
   "Intellectual Property" is   nowhere near as valuable   as "Intellect"
 
 BOFH excuse #208:
 Your mail is being routed through Germany... and they're censoring us
 
 
 
 --MP_6dyp7e.H=Bxbhl9UQCt/stc
 Content-Type: text/x-patch; name=vuln.xml.diff
 Content-Transfer-Encoding: 7bit
 Content-Disposition: attachment; filename=vuln.xml.diff
 
 --- vuln.xml.cvs	Thu Jan 26 11:40:13 2006
 +++ vuln.xml	Thu Jan 26 14:36:06 2006
 @@ -34,6 +34,45 @@
  
  -->
  <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
 +  <vuln vid="1613db79-8e52-11da-8426-000fea0a9611">
 +    <topic>kpopup -- local root exploit and local denial of service</topic>
 +    <affects>
 +      <package>
 +	<name>kpopup</name>
 +	<range><ge>0.9.1</ge><le>0.9.5</le></range>
 +      </package>
 +    </affects>
 +    <description>
 +      <body xmlns="http://www.w3.org/1999/xhtml">;
 +	<p>Mitre CVE reports:</p>
 +	<blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1170">;
 +	  <p>Format string vulnerability in main.cpp in kpopup 0.9.1-0.9.5pre2
 +          allows local users to cause a denial of service (segmentation fault)
 +          and possibly execute arbitrary code via format string specifiers in
 +          command line arguments.</p>
 +        </blockquote>
 +        <blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1167">;
 +          <p>misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall,
 +          which allows local users to elevate their privileges by modifying the
 +          PATH variable to reference a malicious killall program.</p>
 +        </blockquote>
 +        <p>SecurityFocus credits "b0f" b0fnet@yahoo.com</p>
 +      </body>
 +    </description>
 +    <references>
 +     <cvename>CVE-2003-1170</cvename>
 +     <bid>8918</bid>
 +     <cvename>CVE-2003-1167</cvename>
 +     <bid>8915</bid>
 +     <url>http://www.securityfocus.com/archive/1/342736</url>;
 +     <url>http://www.henschelsoft.de/kpopup_en.html</url>;
 +    </references>
 +    <dates>
 +      <discovery>2003-10-28</discovery>
 +      <entry>2006-01-26</entry>
 +    </dates>
 +  </vuln>
 +
    <vuln vid="57a0242d-8c4e-11da-8ddf-000ae42e9b93">
      <topic>sge -- local root exploit in bundled rsh executable</topic>
      <affects>
 
 --MP_6dyp7e.H=Bxbhl9UQCt/stc--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200601261250.k0QCoA7G004269>