Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4FFD5643.6030503@redhat.com>
Date: Wed, 11 Jul 2012 12:32:35 +0200
From: Stefan Cornelius <scorneli@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: glibc formatted printing vulnerabilities

Hi,

there are further vulnerabilities in glibc's formatted printing
functionality.

1) It was discovered that the formatted printing functionality in glibc
did not properly honor the size of a structure when calculating the
amount of memory to allocate. A remote attacker could provide a
specially crafted sequence of format specifiers, leading to an
undersized buffer allocation and subsequent stack corruption, resulting
in a crash or, potentially, FORTIFY_SOURCE format string protection
mechanism bypass, when processed.

References:
http://sourceware.org/bugzilla/show_bug.cgi?id=12445
http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=84a4211850e3d23a9d3a4f3b294752a3b30bc0ff
https://bugzilla.redhat.com/show_bug.cgi?id=833703

2) It was discovered that the formatted printing functionality in glibc
used extend_alloca() incorrectly. "nspecs_max" is incorrectly passed to
extend_alloca, which modifies the value in "nspecs_max" when allocating
the memory. A remote attacker could provide a specially crafted sequence
of format specifiers, leading to a desynchronization within the buffer
size handling, resulting in the use of uninitialized memory or,
potentially, FORTIFY_SOURCE format string protection mechanism bypass,
when processed.

References:
http://sourceware.org/bugzilla/show_bug.cgi?id=13446
http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=a4647e727a2a52e1259474c13f4b13288938bed4
https://bugzilla.redhat.com/show_bug.cgi?id=833704

It seems like 1) and 2) were introduced by the following commit:
http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1d498daa95384e5c9ad5bcb35e7a996e5869ac39


3) It was discovered that the formatted printing functionality in glibc
did not properly restrict the use of alloca(). A remote attacker could
provide a specially crafted sequence of format specifiers, leading to a
crash or, potentially, FORTIFY_SOURCE format string protection mechanism
bypass, when processed.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=826943

Red Hat patch backports/testcases for RHEL6 that include a patch for this:
https://bugzilla.redhat.com/attachment.cgi?id=594722&action=diff

Red Hat patch backport/testcase for RHEL5 (older glibc versions)
https://bugzilla.redhat.com/attachment.cgi?id=594727&action=diff


Thanks in advance and kind regards
-- 
Stefan Cornelius / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.