Bug 867790 (CVE-2012-4527) - CVE-2012-4527 mcrypt: stack-based buffer overflow by encryption / decryption of overly long file names
Summary: CVE-2012-4527 mcrypt: stack-based buffer overflow by encryption / decryption ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-4527
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 867879 867881
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-10-18 10:00 UTC by Attila Bogar
Modified: 2019-09-29 12:56 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-05-09 21:01:37 UTC
Embargoed:


Attachments (Terms of Use)
patch to fix the buffer overflow (2.71 KB, patch)
2012-10-18 10:00 UTC, Attila Bogar
no flags Details | Diff
new spec (4.39 KB, text/x-rpm-spec)
2012-10-18 10:01 UTC, Attila Bogar
no flags Details
80-width patch (2.64 KB, patch)
2012-10-29 22:23 UTC, Nobuhiro Iwamatsu
no flags Details | Diff
PATH_MAX+1k buffer. Do use buf length in snprintf calls (3.65 KB, patch)
2012-11-02 18:16 UTC, contact_redhat
no flags Details | Diff

Description Attila Bogar 2012-10-18 10:00:02 UTC
Created attachment 629285 [details]
patch to fix the buffer overflow

Description of problem:
A buffer overflow in mcrypt version 2.6.8 and earlier due to long filenames.  If a user were tricked into attempting to encrypt/decrypt specially crafted long filename(s), this flaw would cause a stack-based buffer overflow that could potentially lead to arbitrary code execution.

Note that this is caught by FORTIFY_SOURCE, which renders this to being a crash-only bug on Fedora.

There are currently no upstream patches for this flaw.

Version-Release number of selected component (if applicable):
mcrypt-2.6.8-9.el6 (possibly others too).

How reproducible:
Run mcrypt with ~128 byte long file names.

Comment 1 Attila Bogar 2012-10-18 10:01:26 UTC
Created attachment 629286 [details]
new spec

spec file to build fixed rpms

Comment 2 Jan Lieskovsky 2012-10-18 13:24:43 UTC
Thank you for your report, Attila. I can confirm the issue (looks to be yet something different than CVE-2012-4409):
  https://bugzilla.redhat.com/show_bug.cgi?id=855029

I am going to steal this bug to be security response product one.

Comment 3 Jan Lieskovsky 2012-10-18 13:37:15 UTC
This issue affects the versions of the mcrypt package, as shipped with Fedora release of 16 and 17. Please schedule an update.

--

This issue affects the versions of the mcrypt package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update.

Comment 4 Jan Lieskovsky 2012-10-18 13:38:21 UTC
Created mcrypt tracking bugs for this issue

Affects: fedora-all [bug 867879]
Affects: epel-all [bug 867881]

Comment 5 Jan Lieskovsky 2012-10-18 13:53:58 UTC
CVE Request:
  http://www.openwall.com/lists/oss-security/2012/10/18/9

Comment 6 Attila Bogar 2012-10-18 14:06:20 UTC
My fix is actually a workaround.

For a proper fix the buffer (tmperr) length should be calculated and malloced before the snprintf is actually called.

Comment 7 Vincent Danen 2012-10-18 20:45:22 UTC
This received CVE-2012-4527:

http://www.openwall.com/lists/oss-security/2012/10/18/12

Comment 8 Tom "spot" Callaway 2012-10-19 18:40:33 UTC
Is there any reason not to apply the workaround patch? I believe that mcrypt is unmaintained at this point in time.

Comment 9 Attila Bogar 2012-10-19 18:55:00 UTC
(In reply to comment #8)
> Is there any reason not to apply the workaround patch? I believe that mcrypt
> is unmaintained at this point in time.

Yes there is.  Someone with more expertise in fixing buffer overflows should come up with a proper patch.

My patch works for me with WIDTH defined 80.  I accidentally submitted the wrong version with WIDTH 132.

Comment 10 Tom "spot" Callaway 2012-10-22 13:18:20 UTC
Well, then I'll just wait for that proper patch.

Comment 11 Nobuhiro Iwamatsu 2012-10-29 22:23:29 UTC
(In reply to comment #9)
> (In reply to comment #8)
> > Is there any reason not to apply the workaround patch? I believe that mcrypt
> > is unmaintained at this point in time.
> 
> Yes there is.  Someone with more expertise in fixing buffer overflows should
> come up with a proper patch.
> 
> My patch works for me with WIDTH defined 80.  I accidentally submitted the
> wrong version with WIDTH 132.

I created the patch which changed WITH into 80. 
Is it OK?

Comment 12 Nobuhiro Iwamatsu 2012-10-29 22:23:58 UTC
Created attachment 635243 [details]
80-width patch

Comment 13 contact_redhat 2012-11-02 18:14:14 UTC
I think it would be better either to replace
#define WIDTH 80
by
#define WIDTH (sizeof(tmperr))

or

#define WIDTH 80
char tmperr[128];
by
#define WIDTH 128
char tmperr[WIDTH];

snprintf does add a \0 at tmperr[WIDTH-1] on overflow

Attached is a proposal to increase the error buffer to PATH_MAX + 1k
The buffer is static, used only in printf. Memory impact should be acceptable.
And this allow to show the end of the error message if a file were to contain a very long name.


I believe a proper fix should be changing all the err_crit like functions to use va_args.
But I suppose it is beyond scope.

Comment 14 contact_redhat 2012-11-02 18:16:43 UTC
Created attachment 637190 [details]
PATH_MAX+1k buffer. Do use buf length in snprintf calls

Comment 15 Tom "spot" Callaway 2012-11-02 18:45:25 UTC
I honestly don't care. I think you need to be proposing this to upstream mcrypt at this point, since the 80 char workaround is sufficient to prevent the overflow.

Comment 16 contact_redhat 2012-11-04 00:25:43 UTC
Just my two cents:

Forget about increasing the buffer size, if you like, ok.

But is weird to have a 128 bytes buffer and use only the 80 firsts bytes.
WIDTH should be 128 to match tmperr buffer.

#define WIDTH 128
char tmperr[WIDTH];

is a better patch, in the sense that it keeps a coherent length where to write compared to the buffer. It make the code reading easier.

Comment 17 Fedora Update System 2012-11-14 18:27:15 UTC
mcrypt-2.6.8-10.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 18 Fedora Update System 2012-11-14 18:29:07 UTC
mcrypt-2.6.8-10.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.