Date: Sun, 5 May 2002 19:46:43 -0400 From: Anthony Schneider <aschneid@mail.slc.edu> To: Colin Percival <colin.percival@wadham.ox.ac.uk> Cc: ReDeeMeR <g0tr00t@usa.net>, FreeBSD-security@FreeBSD.ORG Subject: Re: Buffer overflow in /usr/games/strfile Message-ID: <20020505194643.A934@mail.slc.edu> In-Reply-To: <5.0.2.1.1.20020505224651.00afbd78@popserver.sfu.ca>; from colin.percival@wadham.ox.ac.uk on Sun, May 05, 2002 at 11:27:49PM %2B0100 References: <20020505213314.8762.qmail@uwdvg007.cms.usa.net> <5.0.2.1.1.20020505224651.00afbd78@popserver.sfu.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
--TB36FDmn/VVEgNH/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, May 05, 2002 at 11:27:49PM +0100, Colin Percival wrote: > Given that this is not a security issue -- as you point out, "no extra= =20 > privileges can be gained" -- this is rather off-topic for -security;=20 > nevertheless, it is less so than discussions of mailing list sender=20 > restrictions, so I'll go ahead and respond. I agree that it is not an *active* security hazard, however, it is a potential security hazard were some other extra-privileged program to rely on strfile's functionality for whatever purpose (think termcap buffer overflows...termcap itself, a library, is not a setuid application, but xterm, which runs setuid root, replies on termcap, and buffer overflows have occurred where a user crafts a malicious termcap file and launches xterm, overflowing a buffer in some termcap routine, and getting dropped to a shell with the same privileges that xterm was run under). /$.02 -Anthony. ----------------------------------------------- PGP key at: http://www.keyserver.net/ http://www.anthonydotcom.com/gpgkey/key.txt Home: http://www.anthonydotcom.com ----------------------------------------------- --TB36FDmn/VVEgNH/ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjzVxGMACgkQ+rDjkNht5F1MqACeIjkLhrkRy02TWjq0690VWXct /78AnjtsFBR7qtpc/4t4Eg0bOA5Vx57B =xgwR -----END PGP SIGNATURE----- --TB36FDmn/VVEgNH/-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020505194643.A934>