Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
BID:13133
Info
Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
| Bugtraq ID: | 13133 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-1100 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 12 2005 12:00AM |
| Updated: | Jul 12 2009 12:56PM |
| Credit: | "dong-hun you" <[email protected]> disclosed this vulnerability. |
| Vulnerable: |
Salim Gasmi GLD 1.4 Salim Gasmi GLD 1.3.1 Salim Gasmi GLD 1.3 Salim Gasmi GLD 1.2 Salim Gasmi GLD 1.1 Salim Gasmi GLD 1.0 |
| Not Vulnerable: |
Salim Gasmi GLD 1.5 |
Discussion
Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
It is reported that GLD contains a format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function.
Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers.
GLD version 1.4 is reportedly affected, but prior versions may also be affected.
It is reported that GLD contains a format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function.
Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers.
GLD version 1.4 is reportedly affected, but prior versions may also be affected.
Exploit / POC
Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
A proof of concept exploit was provided by "you dong-hun"(Xpl017Elz) <[email protected]>:
A proof of concept exploit was provided by "you dong-hun"(Xpl017Elz) <[email protected]>:
Solution / Fix
Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
Solution:
Gentoo Linux has released advisory GLSA 200504-10 dealing with this and other issues. Gentoo advises that all users update their packages by carrying out the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=mail-filter/gld-1.5"
For more information, please see the referenced Gentoo Linux advisory.
The vendor, Salim Gasmi, has released an upgrade resolving these issues.
Salim Gasmi GLD 1.0
Salim Gasmi GLD 1.1
Salim Gasmi GLD 1.2
Salim Gasmi GLD 1.3
Salim Gasmi GLD 1.3.1
Salim Gasmi GLD 1.4
Solution:
Gentoo Linux has released advisory GLSA 200504-10 dealing with this and other issues. Gentoo advises that all users update their packages by carrying out the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=mail-filter/gld-1.5"
For more information, please see the referenced Gentoo Linux advisory.
The vendor, Salim Gasmi, has released an upgrade resolving these issues.
Salim Gasmi GLD 1.0
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
Salim Gasmi GLD 1.1
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
Salim Gasmi GLD 1.2
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
Salim Gasmi GLD 1.3
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
Salim Gasmi GLD 1.3.1
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
Salim Gasmi GLD 1.4
-
Salim Gasmi gld 1.5
http://www.gasmi.net/down/gld-1.5.tgz
References
Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
References:
References:
- GLD Home Page (Salim Gasmi)
- GLD (Greylisting daemon for Postfix) multiple vulnerabilities. ("dong-hun you"
)