Perl Format String Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Does this affect us?

(1) HIGH: Perl Format String Vulnerability
Perl versions 5.9.2 and 5.8.6 confirmed; potentially all Perl versions
Webmin version 1.23 and prior

Description: Perl is widely used as a scripting language for a variety
of applications including web-based software. Perl contains a
vulnerability that can be triggered by passing a format specifier of the
form "%INT_MAXn". The vulnerability causes an integer variable in a Perl
function to wrap around (change its parity) that can be exploited to
execute arbitrary code. For instance, "%2147483647n" format specifier
will trigger the flaw in Perl running on 32-bit Operating Systems. Note
that the flaw can be exploited only via Perl-based applications that
contain a format string vulnerability. The discoverers have reportedly
found several applications that are vulnerable.

One of the affected applications is Webmin, a web interface to perform
administrative tasks like server and user configuration. Webmin's web
server, which runs on port 10000/tcp by default, contains a
format string vulnerability. By passing a username containing a format
specifier, an attacker can exploit the flaw to execute arbitrary code
with possibly root privileges. Immunity, Inc. has made an exploit
available to some of its customers.

Status: Some Linux vendors have released patches. The discoverers have
also released an unofficial patch for version 5.9.2 that is available

A workaround for the Webmin flaw is to block the traffic to port
10000/tcp at the network perimeter.

Council Site Actions:  Most of the council sites are responding to this
item on some level and plan to install patches as they are made
available.  Several sites have notified their web developers.  One site
requested updates from the 3rd party providers that bundle Perl with
applications in use at their site.  Another site said that they have
several Mandriva Linux systems running Webmin and plan to recommend that
the affected system administrators apply the MDKSA-2005:223 update.
These systems are used by a few dozen users. The remaining council sites
commented they do not use Perl on and of their web servers.

DyadSecurity Advisory
Posting by giarc
Posting by Dave Aitel
Webmin Documentation
Webmin Homepage
SecurityFocus BID



[Fedora Development]     [Fedora Announce]     [Fedora Legacy Announce]     [Fedora Config]     [PAM]     [Fedora General Discussion]     [Big List of Linux Books]     [Gimp]     [Free Internet Dating]     [Yosemite Questions]

Powered by Linux