ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: iDEFENSE Security Advisory 10.13.05: Multiple Vendor wget/curl NTLMUsername Buffer Overflow Vulnerability



> 
> Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability
> 
> iDEFENSE Security Advisory 10.13.05
> www.idefense.com/application/poi/display?id=322&type=vulnerabilities
> October 13, 2005
> 
> I. BACKGROUND
> 
> GNU Wget is a free software package for retrieving files using HTTP,
> HTTPS and FTP, the most widely-used Internet protocols. It is a
> non-interactive commandline tool, so it may easily be called from
> scripts, cron jobs, terminals without X-Windows support, etc. More
> information on Wget is available from the vendor website:
> 
>       http://www.gnu.org/software/wget/wget.html
> 
> curl is a command line tool for transferring files with URL syntax,
> supporting FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE 
> and LDAP.
> Curl supports HTTPS certificates, HTTP POST, HTTP PUT, FTP uploading,
> HTTP form based upload, proxies, cookies, user+password authentication
> (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume,
> proxy tunneling and a busload of other useful tricks. More information
> on curl is available from the vendor website:
> 
>       http://curl.haxx.se/
> 
> II. DESCRIPTION
> 
> Remote exploitation of a buffer overflow vulnerability in multiple 
> vendor's implementations of curl and wget allows attackers to execute 
> arbitrary code. 
> 
> The vulnerability specifically exists due to insufficient bounds 
> checking on user-supplied data supplied to a memory copy 
> operation. The 
> memcpy() of the supplied ntlm username to ntlmbuf shown below results 
> in a stack overflow:
> 
> http-ntlm.c in ntlm_output() on line 532:
> 
>     /* size is now 64 */
>     size=64;
>     ntlmbuf[62]=ntlmbuf[63]=0;
> 
>     memcpy(&ntlmbuf[size], domain, domlen);
>     size += domlen;
> 
>     memcpy(&ntlmbuf[size], usr, userlen);
>     size += userlen;
> 
> The resulting stack overflow can be leveraged to gain arbitrary code 
> execution with user privileges.
> 
> III. ANALYSIS
> 
> Successful exploitation of the vulnerability allows remote 
> attackers to 
> execute arbitrary code with permissions of the http client process. 
> User interaction is required. Exploitation requires a user to use one 
> of the affected clients to connect to a malicious website.
> 
> This vulnerability affects both wget and curl clients 
> similarly because 
> wget 1.10 adopted the curl ntlm authentication source code 
> into its own 
> code base. The described vulnerability requires that ntlm 
> authentication
> 
> is enabled in the affected client versions. A factor that somewhat 
> increases the risk of this vulnerability is that a client can 
> be forced 
> to reconnect using ntlm authentication by issuing a HTTP 302 REDIRECT 
> command to the connecting client.
> 
> IV. DETECTION
> 
> iDEFENSE Labs has confirmed the following software versions are 
> vulnerable:
> 
>     *   wget 1.10
>     *   curl 7.13.2
>     *   libcurl 7.13.2 
> 
> V. WORKAROUND
> 
> As a workaround solution, disable NTLM support in wget and curl 
> installations.
> 
> VI. VENDOR RESPONSE
> 
> wget 1.10.2 has been released to address this issue and is 
> available for
> download at:
> 
>    http://ftp.gnu.org/pub/gnu/wget/
> 
> curl has released the following patch to address this issue:
> 
>    http://curl.haxx.se/libcurl-ntlmbuf.patch
> 
> curl has also released the following security advisory:
> 
>    http://curl.haxx.se/mail/lib-2005-10/0061.html
>    
> Additionally, the maintainers of curl-web have provided the following
> details on affected versions:
> 
> Affected versions: curl and libcurl 7.10.6 to and including 7.14.1
> 
> Not affected versions: curl and libcurl 7.10.5 and earlier,
>   7.15.0 and later
> 
> VII. CVE INFORMATION
> 
> The Common Vulnerabilities and Exposures (CVE) project has 
> assigned the
> name CAN-2005-3185 to this issue. This is a candidate for inclusion in
> the CVE list (http://cve.mitre.org), which standardizes names for
> security problems.
> 
> VIII. DISCLOSURE TIMELINE
> 
> 10/12/2005  Initial vendor notification
> 10/12/2005  Initial vendor response
> 10/13/2005  Coordinated public disclosure
> 
> IX. CREDIT
> 
> The discoverer of this vulnerability wishes to remain anonymous.
> 
> Get paid for vulnerability research
> http://www.idefense.com/poi/teams/vcp.jsp
> 
> Free tools, research and upcoming events
> http://labs.idefense.com
> 
> X. LEGAL NOTICES
> 
> Copyright (c) 2005 iDEFENSE, Inc.
> 
> Permission is granted for the redistribution of this alert
> electronically. It may not be edited in any way without the express
> written consent of iDEFENSE. If you wish to reprint the whole or any
> part of this alert in any other medium other than 
> electronically, please
> email customerservice@xxxxxxxxxxxx for permission.
> 
> Disclaimer: The information in the advisory is believed to be accurate
> at the time of publishing based on currently available 
> information. Use
> of the information constitutes acceptance for use in an AS IS 
> condition.
> There are no warranties with regard to this information. Neither the
> author nor the publisher accepts any liability for any 
> direct, indirect,
> or consequential loss or damage arising from use of, or reliance on,
> this information.
> 
> 




 




Copyright © Lexa Software, 1996-2009.