Lucene search

K

ipfilter.3.2.10.txt

🗓️ 17 Aug 1999 00:00:00Reported by Packet StormType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 23 Views

IPFilter v3.2.10 vulnerable to file creation issue; fixed in latest version.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Date: Thu, 15 Apr 1999 17:56:02 +0000  
From: 0x1c <[email protected]>  
To: [email protected]  
Subject: FSA-99.04-IPFILTER-v3.2.10  
  
The author (Darren Reed) was notified about this problem early April. I  
believe it has been fixed in the latest version.  
  
FERALMONKEY SECURITY ADVISORY - IPFILTER v3.2.10  
  
Title: FSA-99.04-IPFILTER-v3.2.10  
Date: April 4th, 1999  
Author: garath <[email protected]>  
Vendor Notified: Yes  
Status: public  
  
Problem Description:  
  
The IPFilter package is a freely distributable TCP/IP packet filter, designed  
primarily for use in a firewalled environment. The package includes a series of  
kernel additions and modifications, and various applications. A problem exists  
in its method of creating files for saving output.  
  
fopen, in ip_fil.c, is used to open the saved output file in an insecure manner:  
  
sprintf(fname, "/tmp/%s", ifp->if_xname);  
if ((fp = fopen(fname, "w")))  
fclose(fp);  
  
This problem has existed in IPFilter since v3.2.3.  
The package comes with the following operating systems:  
  
o OpenBSD  
o FreeBSD (post 2.2)  
o NetBSD (post 1.2)  
  
and has been tested and run on:  
  
o Solaris/Solaris-x86 2.3 - 2.6  
o SunOS 4.1.1 - 4.1.4  
o BSD/OS 1.1 - 3.1  
o IRIX 6.2  
o Linux 2.0.31 - 2.0.35  
  
Impact:  
  
Any user, anticpating priviledged usage of these routines, can create a symbolic link which could effectively clobber arbitrary  
system files. Because none of  
the commands which use this vulnerable routine are setuid, normal users cannot  
create files in system directories.  
  
Environment:  
  
Testing was performed using IPFilter v3.2.10 in OpenBSD 2.5-beta.  
  
Solution:  
  
Do not place lockfiles in /tmp. Each flavor listed above has a specific directory for such files, ie, "/var/run" in FreeBSD,  
OpenBSD, and NetBSD. When opening  
these files, use open with O_EXCL and fdopen, rather than fopen.  
  
--EOF  
  
Cheers,  
Nick  
  
--  
Therefore those skilled at the unorthodox are as infinite as heaven and  
earth, inexhaustible as the great rivers. -- Sun Tzu, The Art of War  
  
------------------------------------------------------------------------------  
  
Date: Fri, 16 Apr 1999 09:10:18 +1000  
From: Darren Reed <[email protected]>  
To: [email protected]  
Subject: Re: FSA-99.04-IPFILTER-v3.2.10  
  
In some mail from 0x1c, sie said:  
>  
> The author (Darren Reed) was notified about this problem early April. I  
> believe it has been fixed in the latest version.  
[...]  
> Do not place lockfiles in /tmp. Each flavor listed above has a specific  
> directory for such files, ie, "/var/run" in FreeBSD, OpenBSD, and NetBSD.  
> When opening  
> these files, use open with O_EXCL and fdopen, rather than fopen.  
  
The files which have data written to are not lockfiles so placing them  
under /var/run could be considered inappropriate.  
  
For those who actually make use of the feature and/or feel they need a  
patch to correctly address this situation (they do testing as root on  
systems where unfriendly users are likely to be present and hanging out  
waiting for root to possibly do something like this), see below.  
  
Darren  
  
Index: ip_fil.c  
===================================================================  
RCS file: /devel/CVS/IP-Filter/ip_fil.c,v  
retrieving revision 2.0.2.44.2.17  
retrieving revision 2.0.2.44.2.18  
diff -c -r2.0.2.44.2.17 -r2.0.2.44.2.18  
*** ip_fil.c 1999/03/15 11:51:57 2.0.2.44.2.17  
--- ip_fil.c 1999/04/11 10:42:36 2.0.2.44.2.18  
***************  
*** 1126,1147 ****  
ip_t *ip;  
{  
# endif  
- FILE *fp;  
char fname[32];  
  
# if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199606)) || \  
(defined(OpenBSD) && (OpenBSD >= 199603))  
sprintf(fname, "/tmp/%s", ifp->if_xname);  
- if ((fp = fopen(fname, "a"))) {  
- fclose(fp);  
- }  
# else  
sprintf(fname, "/tmp/%s%d", ifp->if_name, ifp->if_unit);  
- if ((fp = fopen(fname, "a"))) {  
- fwrite((char *)ip, ntohs(ip->ip_len), 1, fp);  
- fclose(fp);  
- }  
# endif  
return 0;  
}  
  
--- 1126,1147 ----  
ip_t *ip;  
{  
# endif  
char fname[32];  
+ int fd;  
  
# if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199606)) || \  
(defined(OpenBSD) && (OpenBSD >= 199603))  
sprintf(fname, "/tmp/%s", ifp->if_xname);  
# else  
sprintf(fname, "/tmp/%s%d", ifp->if_name, ifp->if_unit);  
# endif  
+ fd = open(fname, O_WRONLY|O_APPEND);  
+ if (fd == -1) {  
+ perror("open");  
+ return -1;  
+ }  
+ write(fd, (char *)ip, ntohs(ip->ip_len));  
+ close(fd);  
return 0;  
}  
  
***************  
*** 1204,1227 ****  
  
void init_ifp()  
{  
- FILE *fp;  
struct ifnet *ifp, **ifa;  
char fname[32];  
# if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199606)) || \  
(defined(OpenBSD) && (OpenBSD >= 199603))  
for (ifa = ifneta; ifa && (ifp = *ifa); ifa++) {  
ifp->if_output = write_output;  
sprintf(fname, "/tmp/%s", ifp->if_xname);  
! if ((fp = fopen(fname, "w")))  
! fclose(fp);  
}  
# else  
  
for (ifa = ifneta; ifa && (ifp = *ifa); ifa++) {  
ifp->if_output = write_output;  
sprintf(fname, "/tmp/%s%d", ifp->if_name, ifp->if_unit);  
! if ((fp = fopen(fname, "w")))  
! fclose(fp);  
}  
# endif  
}  
--- 1204,1234 ----  
  
void init_ifp()  
{  
struct ifnet *ifp, **ifa;  
char fname[32];  
+ int fd;  
+  
# if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199606)) || \  
(defined(OpenBSD) && (OpenBSD >= 199603))  
for (ifa = ifneta; ifa && (ifp = *ifa); ifa++) {  
ifp->if_output = write_output;  
sprintf(fname, "/tmp/%s", ifp->if_xname);  
! fd = open(fname, O_WRONLY|O_CREAT|O_EXCL, 0600);  
! if (fd == -1)  
! perror("open");  
! else  
! close(fd);  
}  
# else  
  
for (ifa = ifneta; ifa && (ifp = *ifa); ifa++) {  
ifp->if_output = write_output;  
sprintf(fname, "/tmp/%s%d", ifp->if_name, ifp->if_unit);  
! fd = open(fname, O_WRONLY|O_CREAT|O_EXCL, 0600);  
! if (fd == -1)  
! perror("open");  
! else  
! close(fd);  
}  
# endif  
}  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 1999 00:00Current
7.4High risk
Vulners AI Score7.4
23
.json
Report