[asterisk-security] AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application

Tzafrir Cohen tzafrir.cohen at xorcom.com
Thu Nov 8 22:11:46 CST 2007


On Thu, Nov 08, 2007 at 02:27:14PM -0800, Gregg Berkholtz wrote:
> If a user has limited sudo privileges, for example, only the ability to
> execute sethdlc, couldn't they exploit this vulnerability to execute
> arbitrary code as root?

The problem is lack of proper sanitation of the parameter -i (interface 
name) for both sethdlc and sethdlc-new . Thus in order to exploit this
bug, one needs to be able to pass an interface name that is long enough
to that parameter.

If you allow the user to execute the script ifup-hdlc from zaptel, this
shouldn't be a problem. I figure you should fix it fix
s/sethdlc/sethdlc-new/ .

Some further clarifications;

1. sethdlc-new
Zaptel contains both sethdlc.c and sethdlc-new.c . Both had the same
problem and were fixed. sethdlc only works with really old systems
(kernels < 2.4.22, IIRC). All others should use sethdlc-new .

2. Kernel/userspace
Unlike information published by some "security company" (and
aparantly later retracted), this is not a buffer overflow in kernel
code. sethdlc.c is not a Zaptel driver.

-- 
               Tzafrir Cohen       
icq#16849755              jabber:tzafrir.cohen at xorcom.com
+972-50-7952406           mailto:tzafrir.cohen at xorcom.com       
http://www.xorcom.com  iax:guest at local.xorcom.com/tzafrir



More information about the asterisk-security mailing list