SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   file Vendors:   Darwin, Ian F.
(Trustix Issues Fix) 'file' Utility Buffer Overflow May Let Local Users Gain Elevated Privileges in Certain Cases
SecurityTracker Alert ID:  1006311
SecurityTracker URL:  http://securitytracker.com/id/1006311
CVE Reference:   CVE-2003-0102   (Links to External Site)
Date:  Mar 18 2003
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.39 and prior versions
Description:   A buffer overflow vulnerability was reported in file(1). A local user may be able to get a local user to execute arbitrary code.

iDEFENSE reported that the flaw resides in a doshn() function call in the 'readelf.c' file. If a local user can get another target local user to invoke the file(1) command to examine a specially crafted malicious file, arbitrary code may be executed with the privileges of the target user.

A demonstration exploit transcript is provided in the Source Message.

Impact:   A local user may be able to cause arbitrary code to be executed by a target user with the privileges of the target user.
Solution:   Trustix has released a fix, available at:

<URI:http://www.trustix.net/pub/Trustix/updates/>
<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>

Users of the SWUP tool can have updates automatically installed using 'swup --upgrade'.

Cause:   Boundary error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  TSL 1.0, 1.1, 1.2, 1.5

Message History:   This archive entry is a follow-up to the message listed below.
Mar 4 2003 'file' Utility Buffer Overflow May Let Local Users Gain Elevated Privileges in Certain Cases



 Source Message Contents

Subject:  TSL-2003-0006 - file


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Bugfix Advisory #2003-0006

Package name:      file
Summary:           Minor bugfix
Date:              2003-03-18
Affected versions: TSL 1.0, 1.1, 1.2, 1.5

- --------------------------------------------------------------------------
Package description:
  The file command is used to identify a particular file according to the
  type of data contained by the file.  File can identify many different
  file types, including ELF binaries, system libraries, RPM packages, and
  different graphics formats.


Problem description:
  The file(1) command contains an overflow which can lead to execution
  of code if run on a especially crafted file.  The code will of course
  be executed as the user running the program, and as such requires
  very special conditions to be a problem.


Action:
  We recommend that all systems with this package installed be upgraded.


Location:
  All TSL updates are available from
  <URI:http://www.trustix.net/pub/Trustix/updates/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:
  <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://www.trustix.net/pub/Trustix/testing/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.net/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.net/TSL-GPG-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.net/errata/trustix-1.2/> and
  <URI:http://www.trustix.net/errata/trustix-1.5/>
  or directly at
  <URI:http://www.trustix.net/errata/misc/2003/TSL-2003-0006-file.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
66a2204fa7b9193f46d98fb05527c441  ./1.1/RPMS/file-3.41-1tr.i586.rpm
2f1c942e349cf336f396257715be687c  ./1.1/SRPMS/file-3.41-1tr.src.rpm
8f42f14c98c4aace8ec98ec39ff35881  ./1.2/RPMS/file-3.41-1tr.i586.rpm
2f1c942e349cf336f396257715be687c  ./1.2/SRPMS/file-3.41-1tr.src.rpm
52d440a9bdb0f8b401535397d5ab8699  ./1.5/RPMS/file-3.41-1tr.i586.rpm
2f1c942e349cf336f396257715be687c  ./1.5/SRPMS/file-3.41-1tr.src.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+dwP4wRTcg4BxxS0RAg3uAJ9Cjj2vIR0qOSwgJhwG6E1YgihIsgCfaUg4
sicALiQbuhvQ9MPFJ+ZFJXw=
=QZFF
-----END PGP SIGNATURE-----

_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo/tsl-announce


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC