SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Speedtouch (USB Driver) Vendors:   speedtouch.sourceforge.net
(Mandrake Issues Fix) Speedtouch USB Driver Format String Flaw May Let Local Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012187
SecurityTracker URL:  http://securitytracker.com/id/1012187
CVE Reference:   CVE-2004-0834   (Links to External Site)
Date:  Nov 11 2004
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.3.1
Description:   A format string vulnerability was reported in the Speedtouch USB driver. A local user may be able to execute arbitrary code.

The vendor reported that the modem_run, pppoa2, and pppoa3 functions make an unsafe syslog() call. A local user may be able to invoke the driver to cause format string characters to be passed to syslog(), potentially resulting in arbitrary code execution. The code will run with the privileges of the driver, which may have set user id (setuid) privileges on some systems.

The vendor credits Max Vozeler with reporting this flaw.

Impact:   A local user may be able to execute arbitrary code, potentially with elevated privileges on some systems.
Solution:   Mandrake has released a fix.

Mandrakelinux 10.0:
36c7a9bab1146e2be2e45bc4f39dbe5c 10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.i586.rpm
bd8d73c3c366a457b1134e1c80261426 10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
a9376a00cd508d5b2d87d56dea2189fb amd64/10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.amd64.rpm
bd8d73c3c366a457b1134e1c80261426 amd64/10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm

Mandrakelinux 10.1:
4d25215c40bd029c4531d21a8f078d54 10.1/RPMS/speedtouch-1.3-8.1.101mdk.i586.rpm
524b17d3a8be931a880bb59429de9e7d 10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
730553feef648f9fd12c0102c84c18ce x86_64/10.1/RPMS/speedtouch-1.3-8.1.101mdk.x86_64.rpm
524b17d3a8be931a880bb59429de9e7d x86_64/10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm

Corporate Server 2.1:
5bb758310e7255364bed57516e7bc0b7 corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.i586.rpm
a2418dfb4c05ee8e4b035e875fa5eaf9 corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
aec85babd39953ecb4f826eff31a957e x86_64/corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.x86_64.rpm
a2418dfb4c05ee8e4b035e875fa5eaf9 x86_64/corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm

Mandrakelinux 9.2:
65668234b2a7ff0208777c5fbdd825bd 9.2/RPMS/speedtouch-1.2-1.1.92mdk.i586.rpm
8defb80e8ba01a169aba1b5f43cf964b 9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
ae6362903a2de1035c1aea6a42e7083b amd64/9.2/RPMS/speedtouch-1.2-1.1.92mdk.amd64.rpm
8defb80e8ba01a169aba1b5f43cf964b amd64/9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm

Multi Network Firewall 8.2:
15a296448e3d9124d542e289fc87e7fc mnf8.2/RPMS/speedtouch-1.0-3.1.M82mdk.i586.rpm
9fef8e30a43efcee2fc3a1167df69ac5 mnf8.2/SRPMS/speedtouch-1.0-3.1.M82mdk.src.rpm

Vendor URL:  speedtouch.sourceforge.net/index.php?/news.en.html (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  10.0, 10.1, 9.2, Corporate Server 2.1, Multi Network Firewall 8.2

Message History:   This archive entry is a follow-up to the message listed below.
Oct 20 2004 Speedtouch USB Driver Format String Flaw May Let Local Users Execute Arbitrary Code



 Source Message Contents

Subject:  [Security Announce] MDKSA-2004:130 - Updated speedtouch packages


This is a multi-part message in MIME format...

------------=_1100135183-1263-3797

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           speedtouch
 Advisory ID:            MDKSA-2004:130
 Date:                   November 10th, 2004

 Affected versions:	 10.0, 10.1, 9.2, Corporate Server 2.1,
			 Multi Network Firewall 8.2
 ______________________________________________________________________

 Problem Description:

 The Speedtouch USB driver contains a number of format string
 vulnerabilities due to improperly made syslog() system calls.
 These vulnerabilities can be abused by a local user to potentially
 allow the execution of arbitray code with elevated privileges.
 
 The updated packages have been patched to prevent this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 36c7a9bab1146e2be2e45bc4f39dbe5c  10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.i586.rpm
 bd8d73c3c366a457b1134e1c80261426  10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 a9376a00cd508d5b2d87d56dea2189fb  amd64/10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.amd64.rpm
 bd8d73c3c366a457b1134e1c80261426  amd64/10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 4d25215c40bd029c4531d21a8f078d54  10.1/RPMS/speedtouch-1.3-8.1.101mdk.i586.rpm
 524b17d3a8be931a880bb59429de9e7d  10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 730553feef648f9fd12c0102c84c18ce  x86_64/10.1/RPMS/speedtouch-1.3-8.1.101mdk.x86_64.rpm
 524b17d3a8be931a880bb59429de9e7d  x86_64/10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm

 Corporate Server 2.1:
 5bb758310e7255364bed57516e7bc0b7  corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.i586.rpm
 a2418dfb4c05ee8e4b035e875fa5eaf9  corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 aec85babd39953ecb4f826eff31a957e  x86_64/corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.x86_64.rpm
 a2418dfb4c05ee8e4b035e875fa5eaf9  x86_64/corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm

 Mandrakelinux 9.2:
 65668234b2a7ff0208777c5fbdd825bd  9.2/RPMS/speedtouch-1.2-1.1.92mdk.i586.rpm
 8defb80e8ba01a169aba1b5f43cf964b  9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 ae6362903a2de1035c1aea6a42e7083b  amd64/9.2/RPMS/speedtouch-1.2-1.1.92mdk.amd64.rpm
 8defb80e8ba01a169aba1b5f43cf964b  amd64/9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm

 Multi Network Firewall 8.2:
 15a296448e3d9124d542e289fc87e7fc  mnf8.2/RPMS/speedtouch-1.0-3.1.M82mdk.i586.rpm
 9fef8e30a43efcee2fc3a1167df69ac5  mnf8.2/SRPMS/speedtouch-1.0-3.1.M82mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBkqxAmqjQ0CJFipgRAlr4AJ0RjMZ5kQ6mdjbGTkgkQ1SuOQmSEgCg46QF
ocNopcuk8K3hi2BAqAhxr8I=
=F14v
-----END PGP SIGNATURE-----


------------=_1100135183-1263-3797
Content-Type: text/plain; name="message.footer"
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

------------=_1100135183-1263-3797--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC