Bug 56976 (CVE-2004-0453)

Summary: VUL-0: CVE-2004-0453: vice: format string bug
Product: [Novell Products] SUSE Security Incidents Reporter: Thomas Biege <thomas>
Component: IncidentsAssignee: Michal Čihař <mcihar>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: CVE-2004-0453: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Thomas Biege 2004-06-14 18:41:29 UTC
Hi, 
I saw the following on FD. 
 
Von: 	Spiro Trikaliotis <trik-news@gmx.de> 
An: 	Full-Disclosure <full-disclosure@lists.netsys.com> 
Kopie: 	Bugtraq <bugtraq@securityfocus.com> 
Betreff: 	[Full-Disclosure] VICE emulator format string vulnerability 
Datum: 	Mon, 14 Jun 2004 07:54:02 +0200	 
------------------------------------------------------------------------ 
VICE Security Advisory                                        VSA-2004-1 
------------------------------------------------------------------------ 
 
Summary: 
 
           Severity: Low 
              Title: VICE monitor memory dump format string vulnerability 
               Date: June 14, 2004 
            Version: 1 
                 ID: VSA-2004-01 
             Impact: Could allow arbitrary code execution 
       Project site: http://www.viceteam.org/ 
  Affected Versions: VICE 1.6 up to 1.14 on all plattforms 
           Revision: 1 
          CVE Names: CAN-2004-0453 
 
------------------------------------------------------------------------ 
 
What is VICE? 
 
  VICE is a program that runs on a Unix, MS-DOS, Win32, OS/2, Acorn RISC 
  OS or BeOS machine and executes programs intended for the old 8-bit 
  Commodore computers. The current version emulates the C64, the C128, 
  the VIC20, all the PET models (except the SuperPET 9000, which is out 
  of line anyway), the PLUS4 and the CBM-II (aka C610). 
 
  More information can be found on the VICE homepage: 
  http://www.viceteam.org/ 
 
 
Affected VICE versions: 
 
  At least VICE 1.6 up to VICE 1.14 on all plattforms are affected. The 
  VICE team has not checked if older version are affected, too. 
 
 
Description: 
 
  There is a format string vulnerability in the handling of the monitor 
  "memory dump" command. If the string to be output contains any % sign, 
  it is interpreted as a command for the output, normally resulting in a 
  crash. Even more sophisticated exploits, like arbitrary code execution 
  on the host machine, are possible. 
 
 
Impact: 
 
  It is possible to crash the emulator or even execute arbitrary code on 
  the host machine from the inside of the emulated machine. For this, an 
  attacker needs to fill up parts of the memory with a specific value 
  and wheedle the user to enter the monitor and type in a specific 
  command. 
 
  Without the user being wheedled to enter the monitor and type in that 
  specific command, this vulnerability is not exploitable. 
 
 
Proof-of-Concept: 
 
  The VICE team will not publish exploit code. 
 
 
Severity rating: 
 
  This vulnerability can be used to execute arbitrary code on the host 
  machine out of the emulated machine. Anyway, since it requires the 
  user to enter the monitor and type a specific command, we find the 
  risk low of exploiting this. It should be hard to wheedle the user to 
  press exact this sequence. 
 
 
Workaround: 
 
  Don't use the VICE monitor. 
 
 
Solution: 
 
  Upgrade to a newer version of VICE as soon as it becomes available, or 
  use the attached security patch at [2]. 
 
 
Updates: 
 
  An online version of this document can be found at [3]. 
 
 
References: 
 
  [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0453 
  [2] http://www.trikaliotis.net/vicekb/vice-1.14-mon-vuln.diff.gz 
  [3] http://www.trikaliotis.net/vicekb/vsa-2004-1 
 
 
Date line: 
 
  June  8, 2004: The VICE team has been informed about this vulnerability 
  June  8, 2004: The VICE team releases an internal patch the fix this 
                 vulnerability 
  June 10, 2004: First Linux distributors are being contacted. 
  June 14, 2004: Publication of this flaw 
 
 
------------------------------------------------------------------------ 
 
June 14, 2004                                              The VICE team 
 
Regards, 
   Spiro Trikaliotis. 
 
_______________________________________________ 
Full-Disclosure - We believe in it. 
Charter: http://lists.netsys.com/full-disclosure-charter.html
Comment 1 Thomas Biege 2004-06-14 18:41:29 UTC
<!-- SBZ_reproduce  -->
-
Comment 2 Thomas Biege 2004-06-14 18:44:03 UTC
fixing it in STABLE is sufficient. 
Comment 3 Michal Čihař 2004-06-15 00:47:23 UTC
Fine, let's wait for new version.
Comment 4 Thomas Biege 2004-08-13 20:02:50 UTC
Date: Fri, 13 Aug 2004 14:00:02 +0200 (CEST) 
From: mcihar@suse.cz 
Reply-To: suse-dist@suse.de 
To: suse-dist@suse.de 
Subject: [SUSE-DIST] submit: vice -> STABLE (stable-all) 
 
Hi, 
package vice has been submitted into /work/src/done/STABLE/vice. 
The sources have been checked out from /work/SRC/all/vice. 
It is intended for stable-all. 
 
vice.changes: 
------------------------------------------------------------------- 
Fri Aug 13 14:00:01 CEST 2004 - mcihar@suse.cz 
 
- there seems to be no version update, so fix security bug (bug 56976) 
 
------------------------------------------------------------------- 
 
total 2550 
-rw-r--r--    1 czbuild  suse          244 Mar 15  2001 README.SuSE 
-rw-r--r--    1 czbuild  suse         2520 Mar 18 10:22 vice 
-rw-r--r--    1 czbuild  suse          483 Jul  1 14:20 vice-1.14-64-bit.patch 
-rw-r--r--    1 czbuild  suse          342 Jun  6  2002 
vice-1.14-destdir.patch 
-rw-r--r--    1 czbuild  suse          329 Mar 19 15:52 
vice-1.14-ei_info.patch 
-rw-r--r--    1 czbuild  suse          288 Mar  4 13:06 vice-1.14-font.patch 
-rw-r--r--    1 czbuild  suse         1529 Mar 19 15:28 vice-1.14-i810.patch 
-rw-r--r--    1 czbuild  suse         3710 Jun 14 21:00 
vice-1.14-mon-vuln.patch 
-rw-r--r--    1 czbuild  suse         3703 Mar  4 14:22 
vice-1.14-regparm.patch 
-rw-r--r--    1 czbuild  suse         4823 Mar  4 13:03 vice-1.14-romimg.patch 
-rw-r--r--    1 czbuild  suse      2539689 Mar  4 13:01 vice-1.14.tar.bz2 
-rw-r--r--    1 czbuild  suse         7579 Aug 13 14:00 vice.changes 
-rw-r--r--    1 czbuild  suse         8348 Aug 13 13:05 vice.spec 
 
Comment 5 Thomas Biege 2009-10-13 20:26:16 UTC
CVE-2004-0453: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)