Your message dated Tue, 18 Jan 2005 04:47:54 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#253079: fixed in tripwire 2.3.1.2.0-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Jul 2004 11:00:50 +0000
>From [EMAIL PROTECTED] Fri Jul 09 04:00:50 2004
Return-path: <[EMAIL PROTECTED]>
Received: from tornado.dat.etsit.upm.es (dat.etsit.upm.es) [138.100.17.73] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1Bit7Z-0008VC-00; Fri, 09 Jul 2004 04:00:50 -0700
Received: (qmail 14511 invoked by uid 1013); 9 Jul 2004 11:00:47 -0000
Date: Fri, 9 Jul 2004 13:00:47 +0200
From: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Tripwire: Format string vulnerability in pipedmailmessage.cpp 
(CAN-2004-0536)
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="C7zPtVaVf+AK4Oqc"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040523i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 


--C7zPtVaVf+AK4Oqc
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: tripwire
Version: 2.3.1.2-6.1
Severity: normal
Tags: security sarge sid patch

(for the Security Team: tripwire is not present in woody so a DSA is not=20
necessary)

=46rom http://www.securityfocus.com/archive/1/365036:

Paul Herman [0] found a local vulnerability in tripwire. If a local user
were to create a file with a carefully crafted filename on the local system
it may be included in mail reports and might execute arbitrary code with
the rigts of the user running the file check.

The Debian package installs a cron job to daily run tripwire and e-mail=20
changes and the source code matches the vulnerable code, in=20
pipedmailmessage.cpp:

        fprintf(mpFile, s.c_str() );

However, the vendor says [1] that it seems that the vulnerability is only
possible if MAILMETHOD is 'sendmail'. The current packages provide a
default configuration which uses as MAILMETHOD 'SMTP'. That's why I'm=20
flagging this bug only as 'normal' and not of higher priority.

Even if the vulnerability does not apply to the default configuration it
should be fixed (I believe that using as MAILMETHOD 'STMP' per default is
not correct, since normal systems do not need to have a local MTA installed
listening in port 25, YMMV)

The patch (from the advisory) to fix this issue is:

Index: src/tripwire/pipedmailmessage.cpp
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- src/tripwire/pipedmailmessage.cpp   21 Jan 2001 00:46:48 -0000      1.1
+++ src/tripwire/pipedmailmessage.cpp   26 May 2004 20:59:15 -0000      1.2
@@ -180,7 +180,7 @@

 void cPipedMailMessage::SendString( const TSTRING& s )
 {
-    if( _ftprintf( mpFile, s.c_str() ) < 0 )
+    if( _ftprintf( mpFile, "%s", s.c_str() ) < 0 )
     {
         TOSTRINGSTREAM estr;
         estr << TSS_GetString( cTripwire,=20
tripwire::STR_ERR2_MAIL_MESSAGE_COMMAND
)

Further information also available in Gentoo's Bugtracking system [2], the=
=20
vulnerability is confirmed by the vendor [3] but it is not yet fixed=20
in CVS upstream. [4]

Regards

Javier

[0] Message-Id: <[EMAIL PROTECTED]>
[1] Message-ID: <[EMAIL PROTECTED]>
[2] http://bugs.gentoo.org/show_bug.cgi?id=3D52945
[3] Message-ID: <[EMAIL PROTECTED]>
[4]=20
http://cvs.sourceforge.net/viewcvs.py/tripwire/tripwire/src/tripwire/pipedm=
ailmessage.cpp

--C7zPtVaVf+AK4Oqc
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA7nrei4sehJTrj0oRAiC8AJ98MH9KOZ1Cy9ZCa86Rg5EQR2tmBgCgnMJg
0EI6ZAl+5oIccwsVXZt+W8Y=
=sO/7
-----END PGP SIGNATURE-----

--C7zPtVaVf+AK4Oqc--

---------------------------------------
Received: (at 253079-close) by bugs.debian.org; 18 Jan 2005 09:54:58 +0000
>From [EMAIL PROTECTED] Tue Jan 18 01:54:58 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Cqq4g-0002QR-00; Tue, 18 Jan 2005 01:54:58 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1Cqpxq-00060l-00; Tue, 18 Jan 2005 04:47:54 -0500
From: Luk Claes <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#253079: fixed in tripwire 2.3.1.2.0-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 18 Jan 2005 04:47:54 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 7

Source: tripwire
Source-Version: 2.3.1.2.0-3

We believe that the bug you reported is fixed in the latest version of
tripwire, which is due to be installed in the Debian FTP archive:

tripwire_2.3.1.2.0-3.diff.gz
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.diff.gz
tripwire_2.3.1.2.0-3.dsc
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.dsc
tripwire_2.3.1.2.0-3_i386.deb
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luk Claes <[EMAIL PROTECTED]> (supplier of updated tripwire package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Jan 2005 08:54:40 +0100
Source: tripwire
Binary: tripwire
Architecture: source i386
Version: 2.3.1.2.0-3
Distribution: unstable
Urgency: low
Maintainer: Luk Claes <[EMAIL PROTECTED]>
Changed-By: Luk Claes <[EMAIL PROTECTED]>
Description: 
 tripwire   - file and directory integrity checker
Closes: 230650 240982 244299 249304 251652 253078 253079 255365 258391 267324 
279814
Changes: 
 tripwire (2.3.1.2.0-3) unstable; urgency=low
 .
   * New maintainer (Closes: #279814)
   * Acknowledge NMUs
     Closes: #249304, #253079, #258391, #240982, #244299, #230650, #253078
   * man/*: Use \- instead of \(hy or - (Closes: #251652)
   * debian/control: Depend on exim4 instead of exim (Closes: #255365)
   * debian/po/pt_BR.po: Update pt_BR translation of the debconf
     templates (Closes: #267324)
   * debian/watch: added
Files: 
 e62754e45ee67516e61335833d7e3747 588 utils optional tripwire_2.3.1.2.0-3.dsc
 ba577528645bd27d0a7cca970b01cedb 115192 utils optional 
tripwire_2.3.1.2.0-3.diff.gz
 8a127fe87d65da4364bf7469fbc51988 1739972 utils optional 
tripwire_2.3.1.2.0-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB7NY55UTeB5t8Mo0RAsj+AKCH0six2YBoqZlxtn8b59/aYg78fwCeJPDv
Rt6zpI8JpeMCyU0H3OLggJ4=
=LbvL
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to