Bug 243256 (CVE-2007-0958)

Summary: CVE-2007-0958 core-dumping unreadable binaries via PT_INTERP
Product: [Other] Security Response Reporter: Marcel Holtmann <holtmann>
Component: vulnerabilityAssignee: Jason Baron <jbaron>
Status: CLOSED ERRATA QA Contact: Martin Jenner <mjenner>
Severity: low Docs Contact:
Priority: medium    
Version: unspecifiedCC: jbaron, jgiles, knoel, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: RHSA-2007-0488 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-06-25 18:05:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Marcel Holtmann 2007-06-08 10:09:42 UTC
CVE-2004-1073 is still an issue -- a patched PoC can still cause a
coredump of a non-readable binary such as /usr/bin/sudo; PoC attached;
the tweak is question is adding:

  eph.p_memsz = 4097;

Run "./poc /usr/bin/sudo" and a "core" spits out -- WFM on a 2.6.17.x

To reproduce, do
* grab poc at the end of advisory.
* add line "eph.p_memsz = 4096;" after "eph.p_filesz = 4096;"
  where first "4096" is something equal to or greater than 4096.
* ./poc /usr/bin/sudo && ls -l

Here I get:

  -rw------- 1 ad   ad	 102400 2007-01-15 19:17 core
  ---s--x--x 2 root root 101820 2007-01-15 19:15 /usr/bin/sudo

Check for MAY_READ as binfmt_misc.c does.

Comment 1 Jason Baron 2007-06-12 15:32:50 UTC
committed in stream rhel‑4.5.z build 55.0.1

Comment 4 Red Hat Bugzilla 2007-06-25 18:05:25 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.