ntop -i Local Format String Vulnerability
BID:1840
Info
ntop -i Local Format String Vulnerability
| Bugtraq ID: | 1840 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Oct 18 2000 12:00AM |
| Updated: | Oct 18 2000 12:00AM |
| Credit: | First posted to Bugtraq by Ksecurity <[email protected]> on Oct 18, 2000. |
| Vulnerable: |
Luca Deri ntop 1.3.1 Luca Deri ntop 1.2 a7-9 Luca Deri ntop 1.2 a10 Luca Deri ntop 1.1 pre3 |
| Not Vulnerable: | |
Discussion
ntop -i Local Format String Vulnerability
ntop (network top) is a unix program used for displaying network usage statistics. It is often installed setuid root because it uses privileged ports.
ntop is vulnerable to a format string vulnerability that can compromise root access locally. If present, the argument to the "-i" command-line option is passed directly to a *printf function without being checked. It is thus possible for an attacker insert format specifiers that will be interpreted by the *printf function. Malicious format specifiers can cause the function to overwrite memory locations on the program's stack with user supplied data. This can lead to execution of arbitrary code with the effective privileges of the process (if setuid root, superuser privs).
ntop (network top) is a unix program used for displaying network usage statistics. It is often installed setuid root because it uses privileged ports.
ntop is vulnerable to a format string vulnerability that can compromise root access locally. If present, the argument to the "-i" command-line option is passed directly to a *printf function without being checked. It is thus possible for an attacker insert format specifiers that will be interpreted by the *printf function. Malicious format specifiers can cause the function to overwrite memory locations on the program's stack with user supplied data. This can lead to execution of arbitrary code with the effective privileges of the process (if setuid root, superuser privs).
Solution / Fix
ntop -i Local Format String Vulnerability
Solution:
Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].