Bugzilla – Bug 64899
VUL-0: CVE-2005-0076: xview-lib buffer overflow
Last modified: 2021-11-02 16:21:53 UTC
Hello, we received the following *non-public* report. From: Martin Schulze <joey@infodrom.org> To: Free Software Distribution Vendors <vendor-sec@lst.de> User-Agent: Mutt/1.5.6+20040907i Subject: [vendor-sec] CAN-2005-0076: Potentional arbitrary code execution in xview Errors-To: vendor-sec-admin@lst.de Date: Sat, 15 Jan 2005 17:37:59 +0100 Erik Sjölund discovered that programs linked against xview are vulnerable to a number of buffer overflows in the XView library. When the overflow is triggered in a program which is installed setuser root a malicious user could perhaps execute arbitrary code as privileged user. These commands will create a segmentation fault: $ ln -s /usr/X11R6/bin/xvmount /tmp/`perl -e 'print "A" x 200'` $ /tmp/`perl -e 'print "A" x 200'` -Wt The overflowed variable seems to be sufficiently far away from the stack frame, but I'm not totally sure that it is impossible to overwrite it as well. I'm attaching a proposed patch. Please let me know if you need coordination for this bug. This package is probably part of most other distributions as well. Regards, Joey -- There are lies, statistics and benchmarks.
<!-- SBZ_reproduce --> $ ln -s /usr/X11R6/bin/xvmount /tmp/`perl -e 'print "A" x 200'` $ /tmp/`perl -e 'print "A" x 200'` -Wt
Do you know if setuid code (on our distries since 8.1) links against this vulnerable code?
'olvwm' does not contain setuid binaries. Besides this we shipped 'xvnews' maintained by 'nadvornik@suse.cz' (until 8.2) 'workman' maintained by 'postadal@suse.cz' (until 9.1) AFAIK they did not contain setuid binaries either.
Vladimir, Petr, can you confirm this please? If we do not ship it setuid we do not need to make a full blown security update. Nevertheless a fix in STABLE should be added.
xvnews was never shipped with setuid.
workman didn't contain setuid binaries.
Ok, I'll close it now. If you *like* add a patch to STABLE.
CVE-2005-0076: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)