loginmsg bug
    Dag-Erling Smørgrav 
    des at des.no
       
    Wed Jul  9 21:10:11 EST 2008
    
    
  
Damien Miller <djm at mindrot.org> writes:
> I'd say the reporter disabled privsep and rigged a PAM module to display
> a custom message (if they worked up to an exploit at all).
>
> The vulnerability criteria seem to be:
>
> 1. protocol 1 enabled
> 2. privsep disabled
> 3. successful authentication
> 4. PAM accounting module in stack that returns attacker-supplied data
That's pretty much what I concluded as well.  He found something that
looked like a classic bug (printf() with no format string) and set up a
highly contrived scenario in which the bug is exploitable.
Anyway, the fix is trivial - add "%s" to the packet_disconnect() call in
do_authloop().
DES
-- 
Dag-Erling Smørgrav - des at des.no
    
    
More information about the openssh-unix-dev
mailing list