Red Hat Bugzilla – Bug 166789
Remotely exploitable buffer overflow
Last modified: 2007-11-30 17:11:12 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050719 Fedora/1.7.10-1.5.1
Description of problem:
prozilla 126.96.36.199 has a remotely exploitable buffer overflow, as described in <http://www.securiteam.com/exploits/5WP082KEUW.html>. This is due to overflows of fixed-sized buffers in the HTTP redirection code.
This is fixed in prozilla 188.8.131.52. Changes in 184.108.40.206, from its NEWS file:
"* Support for downloading files > 2GB.
* Fix a remotely exploitable format string security bug.
* Fix bugs in the handling of bad command-line options. Previously
prozilla would return the success status code, even though it failed.
Now it returns failure.
* Fix a segfault. This occurred when prozilla could not assemble a file
due to lack of disk space and the user chose to abort the operation.
* Fix some typos."
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. Create a special account for running the test. I called this account "victim". prozilla will be run from this and will be exploited.
2. Build and run the exploit code from the Securiteam advisory. This runs a fake web server.
3. Connect to the fake webserver.
4. See prozilla has been exploited.
Actual Results: Worked on FC3 on i386. Didn't seem to work on FC3 on x86_64, but that may just have been lucky.
Built, pushing later today
This is CAN-2005-0523
220.127.116.11-1 has been in the repos for some time.