Linux man -l Format String Vulnerability
BID:2327
Info
Linux man -l Format String Vulnerability
| Bugtraq ID: | 2327 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Jan 31 2001 12:00AM |
| Updated: | Jan 31 2001 12:00AM |
| Credit: | This vulnerability was announced to Bugtraq by Joao Gouveia <[email protected]> on January 31, 2001. |
| Vulnerable: |
SuSE Linux 7.0 SuSE Linux 6.4 SuSE Linux 6.3 Debian Linux 2.2 sparc Debian Linux 2.2 powerpc Debian Linux 2.2 arm Debian Linux 2.2 alpha Debian Linux 2.2 68k Debian Linux 2.2 |
| Not Vulnerable: | |
Discussion
Linux man -l Format String Vulnerability
man is the manual page viewing program, available with the Linux Operating System in this implementation. It is freely distributed and openly maintained.
A problem with the man command may allow for the elevation of privileges. Due to the handling of format strings by the -l argument of the man command, it may be possible for a local user to pass format strings through the man command, which could allow a user to write to a specific address in the stack and overwrite variables, including the return address of functions on the stack. man, as implemented with some distributions of the Linux operating system, is included as an SUID root binary.
It may be possible for a malicious user with local access to execute arbitrary code on the stack, and potentially gain elevated privileges, including administrative access.
man is the manual page viewing program, available with the Linux Operating System in this implementation. It is freely distributed and openly maintained.
A problem with the man command may allow for the elevation of privileges. Due to the handling of format strings by the -l argument of the man command, it may be possible for a local user to pass format strings through the man command, which could allow a user to write to a specific address in the stack and overwrite variables, including the return address of functions on the stack. man, as implemented with some distributions of the Linux operating system, is included as an SUID root binary.
It may be possible for a malicious user with local access to execute arbitrary code on the stack, and potentially gain elevated privileges, including administrative access.
Exploit / POC
Solution / Fix
Linux man -l Format String Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Debian Linux 2.2 powerpc
Debian Linux 2.2 sparc
Debian Linux 2.2 alpha
Debian Linux 2.2
Debian Linux 2.2 arm
Debian Linux 2.2 68k
Solution:
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Debian Linux 2.2 powerpc
-
Debian 2.2 ppc man-db_2.3.16-1.1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/ma n-db_2.3.16-1.1_powerpc.deb
Debian Linux 2.2 sparc
-
Debian 2.2 sparc man-db_2.3.16-1.1_sparc.deb
http://security.debian.org/dists/stable/updates/main/binary-sparc/man- db_2.3.16-1.1_sparc.deb
Debian Linux 2.2 alpha
-
Debian 2.2 alpha man-db_2.3.16-1.1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/man- db_2.3.16-1.1_alpha.deb
Debian Linux 2.2
-
Debian 2.2 i386 man-db_2.3.16-1.1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/man-d b_2.3.16-1.1_i386.deb
Debian Linux 2.2 arm
-
Debian 2.2 arm man-db_2.3.16-1.1_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/man-db _2.3.16-1.1_arm.deb
Debian Linux 2.2 68k
-
Debian 2.2 m68k man-db_2.3.16-1.1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/man-d b_2.3.16-1.1_m68k.deb
References
Linux man -l Format String Vulnerability
References:
References: