ELinks Relative Path Arbitrary Code Execution Vulnerability
BID:23844
Info
ELinks Relative Path Arbitrary Code Execution Vulnerability
| Bugtraq ID: | 23844 |
| Class: | Design Error |
| CVE: |
CVE-2007-2027 |
| Remote: | No |
| Local: | Yes |
| Published: | May 07 2007 12:00AM |
| Updated: | Oct 16 2009 04:38PM |
| Credit: | Arnaud Giersch is credited with discovery of this vulnerability. |
| Vulnerable: |
Ubuntu Ubuntu Linux 7.04 sparc Ubuntu Ubuntu Linux 7.04 powerpc Ubuntu Ubuntu Linux 7.04 i386 Ubuntu Ubuntu Linux 7.04 amd64 Ubuntu Ubuntu Linux 6.10 sparc Ubuntu Ubuntu Linux 6.10 powerpc Ubuntu Ubuntu Linux 6.10 i386 Ubuntu Ubuntu Linux 6.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 Trustix Secure Linux 3.0.5 Trustix Secure Linux 3.0 Redhat Fedora Core6 Redhat Fedora Core5 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux Desktop Workstation 5 client Redhat Enterprise Linux Desktop 5 client Redhat Enterprise Linux AS 4 Redhat Enterprise Linux 5 Server Gentoo Linux ELinks ELinks 0.11.1 ELinks ELinks 0.10.6 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 m68k Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 Avaya Aura Application Enablement Services 4.2.1 Avaya AES 4.2.2 Avaya AES 4.2 |
| Not Vulnerable: | |
Discussion
ELinks Relative Path Arbitrary Code Execution Vulnerability
ELinks is prone to an arbitrary code-execution vulnerability.
An attacker can exploit this issue to potentially execute arbitrary code with the privileges of the user running the affected application.
This issue requires an attacker to trick an unsuspecting victim into running the vulnerable application in an attacker-controlled directory.
This issue affects ELinks 0.11.1; other versions may also be vulnerable.
ELinks is prone to an arbitrary code-execution vulnerability.
An attacker can exploit this issue to potentially execute arbitrary code with the privileges of the user running the affected application.
This issue requires an attacker to trick an unsuspecting victim into running the vulnerable application in an attacker-controlled directory.
This issue affects ELinks 0.11.1; other versions may also be vulnerable.
Exploit / POC
ELinks Relative Path Arbitrary Code Execution Vulnerability
To exploit this issue, attackers must entice victims into executing the application from a controlled directory (such as '/tmp').
To trigger a denial of service, the attacker must supply a malformed catalog.
The following proof of concept is available:
$ mkdir -p /tmp/elinks/{run,po}
$ cp /usr/share/locale/fr/LC_MESSAGES/elinks.mo /tmp/elinks/po/fr.gmo
$ dd if=/dev/urandom of=/tmp/elinks/po/fr.gmo bs=1024 seek=1 count=200
$ cd /tmp/elinks/run
To exploit this issue, attackers must entice victims into executing the application from a controlled directory (such as '/tmp').
To trigger a denial of service, the attacker must supply a malformed catalog.
The following proof of concept is available:
$ mkdir -p /tmp/elinks/{run,po}
$ cp /usr/share/locale/fr/LC_MESSAGES/elinks.mo /tmp/elinks/po/fr.gmo
$ dd if=/dev/urandom of=/tmp/elinks/po/fr.gmo bs=1024 seek=1 count=200
$ cd /tmp/elinks/run
Solution / Fix
ELinks Relative Path Arbitrary Code Execution Vulnerability
Solution:
Please see the referenced advisories for more information.
ELinks ELinks 0.10.6
ELinks ELinks 0.11.1
Solution:
Please see the referenced advisories for more information.
ELinks ELinks 0.10.6
-
Ubuntu elinks-lite_0.10.6-1ubuntu3.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .10.6-1ubuntu3.1_amd64.deb -
Ubuntu elinks-lite_0.10.6-1ubuntu3.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .10.6-1ubuntu3.1_i386.deb -
Ubuntu elinks-lite_0.10.6-1ubuntu3.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .10.6-1ubuntu3.1_powerpc.deb -
Ubuntu elinks-lite_0.10.6-1ubuntu3.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .10.6-1ubuntu3.1_sparc.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_amd64.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_i386.deb -
Ubuntu elinks_0.10.6-1ubuntu3.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ub untu3.1_amd64.deb -
Ubuntu elinks_0.10.6-1ubuntu3.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ub untu3.1_i386.deb -
Ubuntu elinks_0.10.6-1ubuntu3.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ub untu3.1_powerpc.deb -
Ubuntu elinks_0.10.6-1ubuntu3.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ub untu3.1_sparc.deb -
Ubuntu elinks_0.11.1-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ub untu2.1_amd64.deb
ELinks ELinks 0.11.1
-
Ubuntu elinks-lite_0.11.1-1.2ubuntu2.1_amd64.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1.2ubuntu2.1_amd64.deb -
Ubuntu elinks-lite_0.11.1-1.2ubuntu2.1_i386.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1.2ubuntu2.1_i386.deb -
Ubuntu elinks-lite_0.11.1-1.2ubuntu2.1_powerpc.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1.2ubuntu2.1_powerpc.deb -
Ubuntu elinks-lite_0.11.1-1.2ubuntu2.1_sparc.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1.2ubuntu2.1_sparc.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_amd64.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_i386.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_powerpc.deb -
Ubuntu elinks-lite_0.11.1-1ubuntu2.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0 .11.1-1ubuntu2.1_sparc.deb -
Ubuntu elinks_0.11.1-1.2ubuntu2.1_amd64.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2 ubuntu2.1_amd64.deb -
Ubuntu elinks_0.11.1-1.2ubuntu2.1_i386.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2 ubuntu2.1_i386.deb -
Ubuntu elinks_0.11.1-1.2ubuntu2.1_powerpc.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2 ubuntu2.1_powerpc.deb -
Ubuntu elinks_0.11.1-1.2ubuntu2.1_sparc.deb
Ubuntu 7.04:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2 ubuntu2.1_sparc.deb -
Ubuntu elinks_0.11.1-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ub untu2.1_amd64.deb -
Ubuntu elinks_0.11.1-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ub untu2.1_i386.deb -
Ubuntu elinks_0.11.1-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ub untu2.1_powerpc.deb -
Ubuntu elinks_0.11.1-1ubuntu2.1_sparc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ub untu2.1_sparc.deb
References
ELinks Relative Path Arbitrary Code Execution Vulnerability
References:
References: